Yaşar University | Curriculum Vitae

Prof. Mehmet Ufuk Çağlayan

Faculty of Engineering / Dept. of Computer Engineering

  • Email ufuk.caglayan@yasar.edu.tr  
  • Phone 0232-570 8226  

Education

Doktora

/ Northwestern University
Thesis Name: A Method for the Design, Representation and Analysis of Distributed Software Systems Using Modified Petri Nets (1981)
Thesis Advisor: Steve S Yau
1976 - 1981

Yüksek Lisans

ELEKTRİK-ELEKTRONİK MÜHENDİSLİĞİ BÖLÜMÜ / ORTA DOĞU TEKNİK ÜNİVERSİTESİ
MÜHENDİSLİK FAKÜLTESİ/ELEKTRİK-ELEKTRONİK MÜHENDİSLİĞİ BÖLÜMÜ/
Thesis Name: Implementation of a Snobol4 Interpreter (1975)
Thesis Advisor: MEHMET BİROL BARAY
1973 - 1975

Lisans

ELEKTRİK-ELEKTRONİK MÜHENDİSLİĞİ BÖLÜMÜ / ORTA DOĞU TEKNİK ÜNİVERSİTESİ
MÜHENDİSLİK FAKÜLTESİ/ELEKTRİK-ELEKTRONİK MÜHENDİSLİĞİ BÖLÜMÜ/
1968 - 1973

Academic Titles

PROFESÖR

BOĞAZİÇİ ÜNİVERSİTESİ / BİLGİSAYAR MÜHENDİSLİĞİ BÖLÜMÜ
1997

DOÇENT

BOĞAZİÇİ ÜNİVERSİTESİ / BİLGİSAYAR MÜHENDİSLİĞİ BÖLÜMÜ
1991

Thesis Advisorship

Master Thesis
MUHAMMED OĞUZHAN TOPGÜL The development of mod_antiCrawl: An anti crawler add-on module for apache web servers Boğaziçi Üniversitesi 2012
SEZER AKAR Development of a new domain-specific language for software architecture specification: DSL-SA Boğaziçi Üniversitesi 2012
METE AKGÜN Security and privacy in radio frequency identification Boğaziçi Üniversitesi 2009
OZAN AKAR Model checking of ambient calculus specifications against ambient logic formulas Boğaziçi Üniversitesi 2009
AYKUT SONER DEMİRKOL Parallel AAA and mobile IP registration for high performance and scalable mobile roaming Boğaziçi Üniversitesi 2009
MEHMET N. AKÇAY Verification of BPEL specifications using model checking Boğaziçi Üniversitesi 2008
EVREN ÖNEM Formal security analysis of a secure on-demandrouting protocol for ad hoc networks using model checking Boğaziçi Üniversitesi 2007
GAMZE YURTTUTAN Group key management in ieee 802.15.4 wireless networks Boğaziçi Üniversitesi 2006
DİLEK DEMİREL Development of a new group key management scheme for mobile ad hoc networks Boğaziçi Üniversitesi 2005
ENGİN DEVECİ PERA: Location based multimedia services framework Boğaziçi Üniversitesi 2004
ERHAN ÇETİNTAŞ Relay attacks on bluetooth authentication and solutions Boğaziçi Üniversitesi 2004
NURCAN TEZCAN End-to-end reliable event transfer in wireless sensor networks Boğaziçi Üniversitesi 2004
HANDAN GÜL ÇALIKLI A policy specification language for an 802.11 wlan with enhanced security network Boğaziçi Üniversitesi 2004
BETÜL TURGUT An AAA based solution for the authentication interoperability of 3G and 802.11 networks Boğaziçi Üniversitesi 2003
METİN İNANÇ Simulation of local and global handoff in wireless in ATM Boğaziçi Üniversitesi 2001
SEYİT AHMET ÇAMTEPE Kerberos based security system for session initiation protocol Boğaziçi Üniversitesi 2001
ERTAN ONUR Measurement based replanning of cell capacities in cellular wireless networks Boğaziçi Üniversitesi 2001
ÇİĞDEM ÇİMEN Design and implementation of a user interface agent for an open marketplace Boğaziçi Üniversitesi 2000
METE YILMAZ Performance evaluation of TCP/IP over ATM and native ATM Boğaziçi Üniversitesi 1999
ERCENK KERESTECİ Generation and evaluation of self-simular traffic in computer networks Boğaziçi Üniversitesi 1997
OĞUZ SİNANOĞLU Development of a frame relay communication interface Boğaziçi Üniversitesi 1995
NİLGÜN OLCAY A Cache-independent benchmark suite Boğaziçi Üniversitesi 1993
ADNAN CAN Program-to-program communication via logical unit (LU) 6,2 protocol Boğaziçi Üniversitesi 1993
ALBERT LEVİ Development of frame relay software for high speed packet switched networks Boğaziçi Üniversitesi 1993
RASİM MAHMUTOĞULLARI Development of an interactive tool for stochastic petri net simulation Boğaziçi Üniversitesi 1992
Q. M. Shawkat H. Bhuiyan Development of A Software Tool To Simulate Stochastic Petri Nets King Fahd University of Petroleum and Minerals 1987
Khaled W. Al-Dhaher Performance Modeling of a Computer System Saudi Arabian Ministery of Interior Online System King Fahd University of Petroleum and Minerals 1987
PhD Thesis
YİĞİT KÜLTÜR Novel models for credit card fraud detection Boğaziçi Üniversitesi 1987
ORHAN ERMİŞ NEW DYNAMIC GROUP KEY AGREEMENT PROTOCOLS AND THEIR FORMAL ANALYSIS AND APPLICATIONS Boğaziçi Üniversitesi 1987
METE AKGÜN Security and privacy of RFID protocols Boğaziçi Üniversitesi 1987
ENGİN DEVECİ Model driven security framework for software design and verification Boğaziçi Üniversitesi 1987
ŞERİF BAHTİYAR Core-crust modeling approach for formal representation of trust in relation to computer security Boğaziçi Üniversitesi 1987
DEVRİM ÜNAL FPFM: A formal specification and verification framework for security policies in multi-domain mobile networks Boğaziçi Üniversitesi 1987
ALBERT LEVİ Design and performanceevalution of the nested certification scheme and its application in public key infrastructures Boğaziçi Üniversitesi 1987
SEMA F. OKTUĞ Design and performance evaluation of a banyan network based interconnection structure for ATM switches Boğaziçi Üniversitesi 1987

Publications

7.1 Published or Accepted to be Published in International Journals Covered by (SCI & SCI-E & SSCI & AHCI)
ÇAĞLAYAN MEHMET UFUK EROL GELENBE A CAREER IN MULTI DISCIPLINARY PROBABILITY MODELS Probability in the Engineering and Informational Sciences, 30(03), 308-325. (SCI-Expanded) 2016
Kültür Yiğit,ÇAĞLAYAN MEHMET UFUK Hybrid approaches for detecting credit card fraud Expert Systems, (), 0-0. (SCI-Expanded) 2016
Mete Akgün,ÇAĞLAYAN MEHMET UFUK Towards Scalable Identification in RFID Systems Wireless Personal Communications, 86(2), 403-421. (SCI-Expanded) 2016
Mete Akgün,Ali Osman Bayrak,ÇAĞLAYAN MEHMET UFUK Attacks and improvements to chaotic map based RFID authentication protocol Security and Communication Networks, 8(18), 4028-4040. (SCI-Expanded) 2015
Orhan Ermiş,Bahtiyar Şerif,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK An improved conference key agreement protocol for dynamic groups with efficient fault correction Security and Communication Networks, 8(7), 1347-1359. (SCI-Expanded) 2015
Mete Akgün,ÇAĞLAYAN MEHMET UFUK Providing destructive privacy and scalability in RFID systems using PUFs Ad Hoc Networks, 32(), 32-42. (SCI-Expanded) 2015
Deveci Engin,ÇAĞLAYAN MEHMET UFUK Model driven security framework for software design and verification Security and Communication Networks, 8(16), 2768-2792. (SCI-Expanded) 2015
Şerif Bahtiyar,ÇAĞLAYAN MEHMET UFUK Trust assessment of security for e health systems Electronic Commerce Research and Applications, 13(3), 164-177. (SCI-Expanded) 2014
Devrim Ünal,ÇAĞLAYAN MEHMET UFUK A formal role based access control model for security policies in multi domain mobile networks Computer Networks, 57(1), 330-350. (SCI-Expanded) 2013
Devrim Ünal,ÇAĞLAYAN MEHMET UFUK Spatiotemporal model checking of location and mobility related security policy specıfications Turkish Journal of Electrical Engineering and Computer Sciences, 21(1), 144-173. (SCI-Expanded) 2013
Devrim Ünal,ÇAĞLAYAN MEHMET UFUK XFPM RBAC XML based specification language for security policies in multidomain mobile networks Security and Communication Networks, 6(12), 1420-1444. (SCI-Expanded) 2013
Şerif Bahtiyar,ÇAĞLAYAN MEHMET UFUK Security similarity based trust in cyber space Knowledge-Based Systems, 52(), 290-301. (SCI-Expanded) 2013
Şerif Bahtiyar,ÇAĞLAYAN MEHMET UFUK Extracting trust information from security system of a service Journal of Network and Computer Applications, 35(1), 480-490. (SCI-Expanded) 2012
Evren Önem,Burak Gürdağ,ÇAĞLAYAN MEHMET UFUK Formal security analysis of Ariadne secure routing protocol using model checking International Journal of Ad Hoc and Ubiquitous Computing, 9(1), 12-24. (SCI-Expanded) 2012
Yeonghwan Tscha,ÇAĞLAYAN MEHMET UFUK Query slipping prevention for trajectory based publishing and subscribing in wireless sensor networks Computer Communications, 29(11), 1979-1991. (SCI-Expanded) 2006
LEVİ ALBERT,ÇAĞLAYAN MEHMET UFUK,Çetin Kaya Koç Use of nested certificates for efficient dynamic and trust preserving public key infrastructure ACM Transactions on Information and System Security, 7(1), 21-59. (SCI-Expanded) 2004
İlker Demirkol,ERSOY CEM,ÇAĞLAYAN MEHMET UFUK,DELİÇ MUSTAFA HAKAN Location Area Planning and Cell to Switch Assignment in Cellular Networks IEEE Transactions on Wireless Communications, 3(3), 880-890. (SCI-Expanded) 2004
ONUR ERTAN,DELİÇ MUSTAFA HAKAN,ERSOY CEM,ÇAĞLAYAN MEHMET UFUK Measurement based replanning of cell capacities in GSM networks Computer Networks, 39(6), 749-767. (SCI-Expanded) 2002
LEVİ ALBERT,ÇAĞLAYAN MEHMET UFUK Analytical performance evaluation of nested certificates Performance Evaluation, 3637(), 213-232. (SCI-Expanded) 1999
OKTUĞ SEMA FATMA,ÇAĞLAYAN MEHMET UFUK Design and performance evaluation of a banyan network based interconnection structure for ATM switches IEEE Journal on Selected Areas in Communications, 15(5), 807-816. (SCI-Expanded) 1997
OKTUĞ SEMA FATMA,ÇAĞLAYAN MEHMET UFUK Parameter Threshold in Type II Traffic for Banyan Networks Electronics Letters, 32(3), 181-182. (SCI-Expanded) 1996
ÇAĞLAYAN MEHMET UFUK Performance Modeling and Evaluation of SAMIS Computer Network by Using PAWS Arabian Journal for Science and Engineering, (), 565-575. (SCI-Expanded) 1990
S S Yau,ÇAĞLAYAN MEHMET UFUK Distributed Software System Design Representation Using Modified Petri Nets IEEE Transactions on Software Engineering, 9(6), 733-745. (SCI-Expanded) 1983
7.2 Published or accepted to be published in International journals covered by other indexes
ÇAĞLAYAN MEHMET UFUK,Fikret Sivrikaya,Bülent Yener What is the Optimum Length of a Wireless Link Upgrade, 5(1), 20-25. Endekste taranmıyor 2004
ÇAĞLAYAN MEHMET UFUK On the Poetic Connections of ADA Communications of ACM, 24(8), 548-548. SCI 1981
7.3 Published in CPCI-S or CPCI-SSH indexed conference proceedings International
Bahtiyar Şerif,Ermiş Orhan,ÇAĞLAYAN MEHMET UFUK Adaptive Trust Scenarios for Mobile Security MobiWIS 2016 2016
Yiğit Kültür,ÇAĞLAYAN MEHMET UFUK A Novel Cardholder Behavior Model for Detecting Credit Card Fraud 9th International Conference on Application of Information and Communication Technologies, AICT 2015
GÖKHAN ÇANTALI,ORHAN ERMİŞ,GÜR GÜRKAN,ALAGÖZ FATİH,ÇAĞLAYAN MEHMET UFUK Lightweight context aware security system for wireless Internet access 2015 IEEE Conference on Communications and Network Security (CNS) 2015
ÇAĞLAYAN MEHMET UFUK ISCIS and Erol Gelenbe s Contributions 30th Int. Symp. on Computer and Information Sciences, ISCIS 2015 2015
Mete Akgün,ÇAĞLAYAN MEHMET UFUK Weaknesses of two RFID protocols regarding de synchronization attacks International Wireless Communications and Mobile Computing Conference, IWCMC 2015 2015
Mete Akgün,ÇAĞLAYAN MEHMET UFUK Vulnerabilities of RFID Security Protocol Based on Chaotic Maps 22nd IEEE International Conference on Network Protocols, ICNP 2014 2014
Orhan Ermiş,Şerif Bahtiyar,ANARIM EMİN,ÇAĞLAYAN MEHMET UFUK Open problems for group key agreement protocols on Vehicular Ad hoc Networks 2013 International Conference on Connected Vehicles and Expo (ICCVE) 2013
LEVİ ALBERT,Çetintaş Erhan,AYDOS MURAT,Koç Çetin Kaya,ÇAĞLAYAN MEHMET UFUK Relay Attacks on Bluetooth Authentication and Solutions 19th Int. Symp. Computer and Information Sciences (ISCIS 2004) 2004
Tezcan Nurcan,Çayırcı Erdal,ÇAĞLAYAN MEHMET UFUK End to end reliable event transfer in wireless sensor networks 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754) 2004
İLKER DEMİRKOL,ERSOY CEM,ÇAĞLAYAN MEHMET UFUK,DELİÇ MUSTAFA HAKAN Location area planning in cellular networks using simulated annealing Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213) 2001
7.6 Published Conference Proceedings National
Deveci Engin,ÇAĞLAYAN MEHMET UFUK Ortak Kriterler ISO IEC 15408 BT Güvenlik Sertifikasyon Sürecinde UML OCL ve Formel Metotların Kullanımı 18. Akademik Bilişim Konferansı 2016
7.7 Other Publications
Others
YURDAKUL CEYHUN,ÇAĞLAYAN MEHMET UFUK Bilgi Teknolojileri Türkiye İçin Nasıl Bir Gelecek Hazırlamakta Türkiye İş Bankası Kültür Yayınları 1997

8. Projects

Opera Akreditif Akreditif Süreçleri Formel Spesifikasyonu Optimizasyonu ve Otomasyonu

Özel Kuruluşlar

ADAX İLETİŞİM AĞLARI SALDIRILARINDA KARŞI ÖNLEMLER İÇİN AKILLI KARAR DESTEK PLATFORMU ADAX Attack Detection and Countermeasures Simulation

Avrupa Birliği

Teleiletişim ve Enformatik Alanlarında Araştırmacı ve Akademisyen Yetiştirme Merkezi Projesi

Kalkınma Bakanlığı

9. Administrative Positions

Arş. Uyg. Merkezi Müdürü BOĞAZİÇİ ÜNİVERSİTESİ

2013 -

Bölüm Bşk. BOĞAZİÇİ ÜNİVERSİTESİ

2000 - 2004

11. Awards

BÜVAK Teşvik Ödülü

BÜVAK / TÜRKİYE
2016

Contact

Üniversite Cad. No: 37-39 Ağaçlı Yol
Bornova / İZMİR