Prof. (PhD) Mehmet Ufuk Çağlayan
Faculty of Engineering / Department of Computer Engineering
- Email
- Phone 0232-570 8226
© 2023 Yaşar University.
GÖKCAN ÇANTALI | Analytical models for the scalability of dynamic group key agreement protocols and secure file sharing systems | Boğaziçi Üniversitesi | 2019 |
NUREFŞAN SERTBAŞ | Trust enhanced secure routing in SDN | Boğaziçi Üniversitesi | 2018 |
MUHAMMED OĞUZHAN TOPGÜL | The development of mod_antiCrawl: An anti crawler add-on module for apache web servers | Boğaziçi Üniversitesi | 2012 |
SEZER AKAR | Development of a new domain-specific language for software architecture specification: DSL-SA | Boğaziçi Üniversitesi | 2012 |
METE AKGÜN | Security and privacy in radio frequency identification | Boğaziçi Üniversitesi | 2009 |
OZAN AKAR | Model checking of ambient calculus specifications against ambient logic formulas | Boğaziçi Üniversitesi | 2009 |
AYKUT SONER DEMİRKOL | Parallel AAA and mobile IP registration for high performance and scalable mobile roaming | Boğaziçi Üniversitesi | 2009 |
MEHMET N. AKÇAY | Verification of BPEL specifications using model checking | Boğaziçi Üniversitesi | 2008 |
EVREN ÖNEM | Formal security analysis of a secure on-demandrouting protocol for ad hoc networks using model checking | Boğaziçi Üniversitesi | 2007 |
GAMZE YURTTUTAN | Group key management in ieee 802.15.4 wireless networks | Boğaziçi Üniversitesi | 2006 |
DİLEK DEMİREL | Development of a new group key management scheme for mobile ad hoc networks | Boğaziçi Üniversitesi | 2005 |
ENGİN DEVECİ | PERA: Location based multimedia services framework | Boğaziçi Üniversitesi | 2004 |
ERHAN ÇETİNTAŞ | Relay attacks on bluetooth authentication and solutions | Boğaziçi Üniversitesi | 2004 |
NURCAN TEZCAN | End-to-end reliable event transfer in wireless sensor networks | Boğaziçi Üniversitesi | 2004 |
HANDAN GÜL ÇALIKLI | A policy specification language for an 802.11 wlan with enhanced security network | Boğaziçi Üniversitesi | 2004 |
BETÜL TURGUT | An AAA based solution for the authentication interoperability of 3G and 802.11 networks | Boğaziçi Üniversitesi | 2003 |
METİN İNANÇ | Simulation of local and global handoff in wireless in ATM | Boğaziçi Üniversitesi | 2001 |
SEYİT AHMET ÇAMTEPE | Kerberos based security system for session initiation protocol | Boğaziçi Üniversitesi | 2001 |
ERTAN ONUR | Measurement based replanning of cell capacities in cellular wireless networks | Boğaziçi Üniversitesi | 2001 |
ÇİĞDEM ÇİMEN | Design and implementation of a user interface agent for an open marketplace | Boğaziçi Üniversitesi | 2000 |
METE YILMAZ | Performance evaluation of TCP/IP over ATM and native ATM | Boğaziçi Üniversitesi | 1999 |
ERCENK KERESTECİ | Generation and evaluation of self-simular traffic in computer networks | Boğaziçi Üniversitesi | 1997 |
OĞUZ SİNANOĞLU | Development of a frame relay communication interface | Boğaziçi Üniversitesi | 1995 |
NİLGÜN OLCAY | A Cache-independent benchmark suite | Boğaziçi Üniversitesi | 1993 |
ADNAN CAN | Program-to-program communication via logical unit (LU) 6,2 protocol | Boğaziçi Üniversitesi | 1993 |
ALBERT LEVİ | Development of frame relay software for high speed packet switched networks | Boğaziçi Üniversitesi | 1993 |
RASİM MAHMUTOĞULLARI | Development of an interactive tool for stochastic petri net simulation | Boğaziçi Üniversitesi | 1992 |
Q. M. Shawkat H. Bhuiyan | Development of A Software Tool To Simulate Stochastic Petri Nets | King Fahd University of Petroleum and Minerals | 1987 |
Khaled W. Al-Dhaher | Performance Modeling of a Computer System Saudi Arabian Ministery of Interior Online System | King Fahd University of Petroleum and Minerals | 1987 |
YİĞİT KÜLTÜR | Novel models for credit card fraud detection | Boğaziçi Üniversitesi | 2017 |
ORHAN ERMİŞ | New dynamic group key agreement protocols and their formal analysis and applications | Boğaziçi Üniversitesi | 2017 |
METE AKGÜN | Security and privacy of RFID protocols | Boğaziçi Üniversitesi | 2016 |
ENGİN DEVECİ | Model driven security framework for software design and verification | Boğaziçi Üniversitesi | 2015 |
ŞERİF BAHTİYAR | Core-crust modeling approach for formal representation of trust in relation to computer security | Boğaziçi Üniversitesi | 2011 |
DEVRİM ÜNAL | FPFM: A formal specification and verification framework for security policies in multi-domain mobile networks | Boğaziçi Üniversitesi | 2011 |
ALBERT LEVİ | Design and performanceevalution of the nested certification scheme and its application in public key infrastructures | Boğaziçi Üniversitesi | 1999 |
SEMA F. OKTUĞ | Design and performance evaluation of a banyan network based interconnection structure for ATM switches | Boğaziçi Üniversitesi | 1996 |
Ermiş Orhan,BAHTİYAR ŞERİF,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK | A key agreement protocol with partial backward confidentiality | Computer Networks, 129(1), 159-177. | (SCI-Expanded) 2017 |
Ermiş Orhan,BAHTİYAR ŞERİF,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK | A secure and efficient group key agreement approach for mobile ad hoc networks | Ad Hoc Networks, 67(), 24-39. | (SCI-Expanded) 2017 |
ÇAĞLAYAN MEHMET UFUK | G-Networks and their Applications to Machine Learning, Energy Packet Networks and Routing | Probability in the Engineering and Informational Sciences, 31(), 381-395. | (SCI-Expanded) 2017 |
KÜLTÜR YİĞİT,ÇAĞLAYAN MEHMET UFUK | A Novel Cardholder Behavior Model for Detecting Credit Card Fraud | AutoSoft-Intelligent Automation and Soft Computing, (), 0-0. | (SCI-Expanded) 2017 |
ÇAĞLAYAN MEHMET UFUK | EROL GELENBE A CAREER IN MULTI DISCIPLINARY PROBABILITY MODELS | Probability in the Engineering and Informational Sciences, 30(03), 308-325. | (SCI-Expanded) 2016 |
Kültür Yiğit,ÇAĞLAYAN MEHMET UFUK | Hybrid approaches for detecting credit card fraud | Expert Systems, (), 0-0. | (SCI-Expanded) 2016 |
Mete Akgün,ÇAĞLAYAN MEHMET UFUK | Towards Scalable Identification in RFID Systems | Wireless Personal Communications, 86(2), 403-421. | (SCI-Expanded) 2016 |
Mete Akgün,Ali Osman Bayrak,ÇAĞLAYAN MEHMET UFUK | Attacks and improvements to chaotic map based RFID authentication protocol | Security and Communication Networks, 8(18), 4028-4040. | (SCI-Expanded) 2015 |
Orhan Ermiş,Bahtiyar Şerif,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK | An improved conference key agreement protocol for dynamic groups with efficient fault correction | Security and Communication Networks, 8(7), 1347-1359. | (SCI-Expanded) 2015 |
Mete Akgün,ÇAĞLAYAN MEHMET UFUK | Providing destructive privacy and scalability in RFID systems using PUFs | Ad Hoc Networks, 32(), 32-42. | (SCI-Expanded) 2015 |
Deveci Engin,ÇAĞLAYAN MEHMET UFUK | Model driven security framework for software design and verification | Security and Communication Networks, 8(16), 2768-2792. | (SCI-Expanded) 2015 |
Şerif Bahtiyar,ÇAĞLAYAN MEHMET UFUK | Trust assessment of security for e health systems | Electronic Commerce Research and Applications, 13(3), 164-177. | (SCI-Expanded) 2014 |
Devrim Ünal,ÇAĞLAYAN MEHMET UFUK | A formal role based access control model for security policies in multi domain mobile networks | Computer Networks, 57(1), 330-350. | (SCI-Expanded) 2013 |
Devrim Ünal,ÇAĞLAYAN MEHMET UFUK | Spatiotemporal model checking of location and mobility related security policy specıfications | Turkish Journal of Electrical Engineering and Computer Sciences, 21(1), 144-173. | (SCI-Expanded) 2013 |
Devrim Ünal,ÇAĞLAYAN MEHMET UFUK | XFPM RBAC XML based specification language for security policies in multidomain mobile networks | Security and Communication Networks, 6(12), 1420-1444. | (SCI-Expanded) 2013 |
Şerif Bahtiyar,ÇAĞLAYAN MEHMET UFUK | Security similarity based trust in cyber space | Knowledge-Based Systems, 52(), 290-301. | (SCI-Expanded) 2013 |
Şerif Bahtiyar,ÇAĞLAYAN MEHMET UFUK | Extracting trust information from security system of a service | Journal of Network and Computer Applications, 35(1), 480-490. | (SCI-Expanded) 2012 |
Evren Önem,Burak Gürdağ,ÇAĞLAYAN MEHMET UFUK | Formal security analysis of Ariadne secure routing protocol using model checking | International Journal of Ad Hoc and Ubiquitous Computing, 9(1), 12-24. | (SCI-Expanded) 2012 |
Yeonghwan Tscha,ÇAĞLAYAN MEHMET UFUK | Query slipping prevention for trajectory based publishing and subscribing in wireless sensor networks | Computer Communications, 29(11), 1979-1991. | (SCI-Expanded) 2006 |
LEVİ ALBERT,ÇAĞLAYAN MEHMET UFUK,Çetin Kaya Koç | Use of nested certificates for efficient dynamic and trust preserving public key infrastructure | ACM Transactions on Information and System Security, 7(1), 21-59. | (SCI-Expanded) 2004 |
İlker Demirkol,ERSOY CEM,ÇAĞLAYAN MEHMET UFUK,DELİÇ MUSTAFA HAKAN | Location Area Planning and Cell to Switch Assignment in Cellular Networks | IEEE Transactions on Wireless Communications, 3(3), 880-890. | (SCI-Expanded) 2004 |
ONUR ERTAN,DELİÇ MUSTAFA HAKAN,ERSOY CEM,ÇAĞLAYAN MEHMET UFUK | Measurement based replanning of cell capacities in GSM networks | Computer Networks, 39(6), 749-767. | (SCI-Expanded) 2002 |
LEVİ ALBERT,ÇAĞLAYAN MEHMET UFUK | Analytical performance evaluation of nested certificates | Performance Evaluation, 3637(), 213-232. | (SCI-Expanded) 1999 |
OKTUĞ SEMA FATMA,ÇAĞLAYAN MEHMET UFUK | Design and performance evaluation of a banyan network based interconnection structure for ATM switches | IEEE Journal on Selected Areas in Communications, 15(5), 807-816. | (SCI-Expanded) 1997 |
OKTUĞ SEMA FATMA,ÇAĞLAYAN MEHMET UFUK | Parameter Threshold in Type II Traffic for Banyan Networks | Electronics Letters, 32(3), 181-182. | (SCI-Expanded) 1996 |
ÇAĞLAYAN MEHMET UFUK | Performance Modeling and Evaluation of SAMIS Computer Network by Using PAWS | Arabian Journal for Science and Engineering, (), 565-575. | (SCI-Expanded) 1990 |
S S Yau,ÇAĞLAYAN MEHMET UFUK | Distributed Software System Design Representation Using Modified Petri Nets | IEEE Transactions on Software Engineering, 9(6), 733-745. | (SCI-Expanded) 1983 |
ÇAĞLAYAN MEHMET UFUK,Fikret Sivrikaya,Bülent Yener | What is the Optimum Length of a Wireless Link | Upgrade, 5(1), 20-25. | Endekste taranmıyor 2004 |
ÇAĞLAYAN MEHMET UFUK | On the Poetic Connections of ADA | Communications of ACM, 24(8), 548-548. | SCI 1981 |
Ermiş Orhan,BAHTİYAR ŞERİF,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK | A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols | The 12th International Conference on Availability, Reliability and Security | 2017 |
BAHTİYAR ŞERİF,Ermiş Orhan,ÇAĞLAYAN MEHMET UFUK | A Framework for Trust Assessment of Security Systems on Flexible Networks | IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), | 2017 |
Bahtiyar Şerif,Ermiş Orhan,ÇAĞLAYAN MEHMET UFUK | Adaptive Trust Scenarios for Mobile Security | MobiWIS 2016 | 2016 |
Yiğit Kültür,ÇAĞLAYAN MEHMET UFUK | A Novel Cardholder Behavior Model for Detecting Credit Card Fraud | 9th International Conference on Application of Information and Communication Technologies, AICT | 2015 |
GÖKHAN ÇANTALI,ORHAN ERMİŞ,GÜR GÜRKAN,ALAGÖZ FATİH,ÇAĞLAYAN MEHMET UFUK | Lightweight context aware security system for wireless Internet access | 2015 IEEE Conference on Communications and Network Security (CNS) | 2015 |
ÇAĞLAYAN MEHMET UFUK | ISCIS and Erol Gelenbe s Contributions | 30th Int. Symp. on Computer and Information Sciences, ISCIS 2015 | 2015 |
Mete Akgün,ÇAĞLAYAN MEHMET UFUK | Weaknesses of two RFID protocols regarding de synchronization attacks | International Wireless Communications and Mobile Computing Conference, IWCMC 2015 | 2015 |
Mete Akgün,ÇAĞLAYAN MEHMET UFUK | Vulnerabilities of RFID Security Protocol Based on Chaotic Maps | 22nd IEEE International Conference on Network Protocols, ICNP 2014 | 2014 |
Orhan Ermiş,Şerif Bahtiyar,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK | Open problems for group key agreement protocols on Vehicular Ad hoc Networks | 2013 International Conference on Connected Vehicles and Expo (ICCVE) | 2013 |
LEVİ ALBERT,Çetintaş Erhan,AYDOS MURAT,Koç Çetin Kaya,ÇAĞLAYAN MEHMET UFUK | Relay Attacks on Bluetooth Authentication and Solutions | 19th Int. Symp. Computer and Information Sciences (ISCIS 2004) | 2004 |
Tezcan Nurcan,Çayırcı Erdal,ÇAĞLAYAN MEHMET UFUK | End to end reliable event transfer in wireless sensor networks | 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754) | 2004 |
İLKER DEMİRKOL,ERSOY CEM,ÇAĞLAYAN MEHMET UFUK,DELİÇ MUSTAFA HAKAN | Location area planning in cellular networks using simulated annealing | Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213) | 2001 |
Deveci Engin,ÇAĞLAYAN MEHMET UFUK | Ortak Kriterler ISO IEC 15408 BT Güvenlik Sertifikasyon Sürecinde UML OCL ve Formel Metotların Kullanımı (Sözlü Sunum) | 18. Akademik Bilişim Konferansı | 2016 |
Others | |||||
YURDAKUL CEYHUN,ÇAĞLAYAN MEHMET UFUK | Bilgi Teknolojileri Türkiye İçin Nasıl Bir Gelecek Hazırlamakta | Türkiye İş Bankası Kültür Yayınları | 1997 |
BASF AG, Almanya | Bilgisayar ve Bilgi Sistemleri Uzmanı | 1989 | 1991 | |
Kral Fahad Petrol ve Mineraller Üniversitesi, Dahran, Suudi Arabistan | Yardımcı Doçent | 1981 | 1987 |
Üniversite Cad. No: 37-39 Ağaçlı Yol
Bornova / İZMİR
0232-570 8226