Search Results - "Bekiroğlu, Berk"
-
1
Survivability Analysis of K-Variant Architecture for Different Memory Attacks and Defense Strategies
Published in IEEE transactions on dependable and secure computing (01-07-2021)“…Many systems require high security during a limited operational timeframe. These systems can be exposed to many attacks that prevent tasks from being…”
Get full text
Journal Article -
2
Source Code Transformations for Improving Security of Time-bounded K-variant Systems
Published in Information and software technology (01-09-2021)“…Source code transformation techniques can improve the security of systems against memory exploitation attacks. As such, the chance of exploitation of security…”
Get full text
Journal Article -
3
Analysis and Implementation of Software Test Case Design Techniques
Published 01-01-2011“…Software testing is a process of finding bugs in a system, and it is an essential part of the software development process. Although, software testing is still…”
Get full text
Dissertation -
4
Program Survivability Through K-Variant Architecture
Published 01-01-2021“…Numerous software systems, particularly mission and safety-critical systems, require a high level of security during their execution. Enhancing software…”
Get full text
Dissertation