Graduate School of Informatics, Term Project

Browse
Search within this collection:

Filters

Entity Type
Project (23)

Has File(s)
Yes (23)

Author
Akgündüz, Okan (1)
Aktaş, Utku (1)
Aktepe, Semih Can (1)
akçören, berkay (1)
Alzariqi, Abdullah Talat Ahmed Mohammed (1)

Subject
Blockchain (2)
Deep Learning, (2)
Smart Contracts (2)
3D Conv LSTM (1)
ADNI Database (1)

Date Issued
2021 - 2025 (23)

Item Type
Term Project (23)

Recent Submissions

A Review of LLM Security: Threats and Mitigations
Günay, Bengi; Tezcan, Cihangir; Department of Cybersecurity (2025-1-23)
Large Language Models (LLMs) are advanced AI systems trained on massive datasets to process and generate natural language. These models can understand, summarize, and create human-like text with remarkable accuracy. Sinc...
JAMMER DETECTION IN AUTONOMOUS VEHICLES WITH MACHINE LEARNING
Demiryürek, Mert; Taşkaya Temizel, Tuğba; Department of Information Systems (2025-1-23)
Wireless communication systems of autonomous vehicles may be vulnerable to threats such as jammer attacks. As a result of these attacks, operational failures and security problems may occur. This study aims to classify whi...
A Survey on Password-free Authentication Method: Passkey
Doğan, Sait Göktuğ; Tezcan, Cihangir; Department of Cybersecurity (2025-1-15)
When a need for to authenticate someone or something, the first answer that comes to mind is to use passwords. While implemented and used properly, passwords are more than enough to securely authenticate. But like everythi...
ASSESSING ADVANCED RETRIEVALAUGMENTED GENERATION TECHNIQUES FOR QUESTION ANSWERING: A CASE STUDY ON GOVERNMENTAL SERVICES
Alzariqi, Abdullah Talat Ahmed Mohammed; Taşkaya Temizel, Tuğba; Department of Information Systems (2025-1-15)
This case study evaluates advanced Retrieval-Augmented Generation (RAG) methods to enhance question answering in conversational AI for government services, focusing on data from the Ministry of Health and Prevention. It as...
Security Assessment of the Smartcard Systems at Middle East Technical University
akçören, berkay; Tezcan, Cihangir; Department of Cybersecurity (2025-1-10)
Smartcards are portable devices that can communicate wirelessly and contain microchips capable of transferring, processing or storing data. They serve practical and reliable solutions for everyday problems such as identifi...
API Security Guideline for Developers and Product Owners
Akgündüz, Okan; Tezcan, Cihangir; Department of Cognitive Sciences (2025-1-10)
A security guideline with security topics, practices, and recommendations to consider when designing, developing, and maintaining an API service for developers and product owners.
METATRANSCRIPTOMICS ANALYSIS USING MICROBIOME RNA-SEQ DATA
Köseoğlu, Aysu; Acar, Aybar Can; Department of Medical Informatics (2024-6-14)
This project aimed to understand Coprothermobacter proteolyticus and explore meta transcriptomics analysis using microbiome RNA sequencing (RNA-seq). Additionally, the project emphasized the importance of training data for...
Using Deep Learning in Detecting Network Attacks
Vahi, Arsalan; Baykal, Nazife; Department of Cybersecurity (2024-6)
Deep learning significantly enhances network attack detection by identifying and analyzing patterns and anomalies in network traffic. Traditional network security methods fail to recognize evolving threats; On the other ha...
PathFinder - An Intelligent Algorithm for MCDC Test-Path Generation
Şimşekoğlu, İsmail; Koçyiğit, Altan; Department of Software Management (2024-1-31)
Introducing Pathfinder, an innovative automated tool designed for generating comprehensive test cases in the realm of C language source codes. The primary objective is to fulfill Modified Condition/Decision Coverage (MC/DC...
USAGE AREAS AND POTENTIAL RISKS OF ADOPTING LLM TOOLS IN SOFTWARE PROJECTS
Çobanoğlu, İpek; Özcan Top, Özden; Department of Information Systems (2024-1-30)
There is widespread use of Large Language Models (LLM) in various industries. However, the legal and ethical issues and risks of using LLM in projects are unclear. This study investigates the usage areas of LLM in software...
Smart Contract Vulnerabilities
Özgen, Mustafa Uğur; Tezcan, Cihangir; Department of Cybersecurity (2024-1-26)
Various industries, particularly financial technologies, are adopting blockchain to create decentralized applications through smart contracts due to its popularity and features such as immutability, pseudo-anonymity, trans...
Predicting Alzheimer's Disease Stage Transformations 12 Months in Advance using 3D Convolutional LSTM based on 3D Magnetic Resonance Images
Erdemir, Elifnur; Aydın Son, Yeşim; Department of Medical Informatics (2024-1-25)
This study evaluates the ability to predict the transition from the healthy cognitive stage to the Alzheimer's stage using a 3D LSTM model. The model was trained on a data set created from MR images taken at different time...
Process, Technology and Human Aspects of a Security Operations Center
Erdıvan, Cem; Acar, Aybar Can; Department of Cybersecurity (2024-1-24)
This report presents the high level aspects of any security operations center and tries to define a baseline for SOC processes, technologies to be used and roles to be assigned for an effective and efficient service. This ...
Zero-knowledge Proofs: zk-SNARK and Applications
Fidan, Mehtap; Tezcan, Cihangir; Department of Cybersecurity (2024-1-24)
As technology advances, the need for secure and private communication becomes crucial. Zero-knowledge proofs (ZKPs) offer a solution to this challenge by allowing entities to validate information without disclosing sensiti...
A REFERENCE ARCHITECTURE FOR SIMULATION-BASED DIGITAL TWINS
Kandaz, Murat; Koçyiğit, Altan; Department of Software Management (2024-1-21)
Digital twins can be based on data, physics, rules, behaviors, and geometry models/features. Together with the conventional data-based approach that has been used for decades, other models that are generally based on engin...
A Review of Cyber Security Maturity Assessment Models for OT Systems
Özkaya, Kamil Olcay; Tezcan, Cihangir; Department of Cybersecurity (2024-1-19)
Cyber security holds significant importance in today's interconnected and digitized industrial landscape. Devices ranging from printers to thermostats, washing machines, and cars are produced in a way that allows them to c...
Investigating Emotions over the Monetary Outcomes of Wheel-Spin Game using Bayesian Models
Arıcı, İrem; Yet, Barbaros; Department of Cognitive Sciences (2024-1-19)
This study investigates the relationship between emotions and outcomes of wheel-spin game with monetary reward. The inference of emotions by a probabilistic programming language account for both the overall emotional respo...
IDENTIFYING TECHNICAL DEBT AND TOOLS FOR TECHNICAL DEBT MANAGEMENT IN SOFTWARE DEVELOPMENT
Muratdağı, Tolga; Koçyiğit, Altan; Department of Software Management (2024-1-19)
This term project explores the concept of technical debt in software development, as initially articulated by Ward Cunningham in 1992. Technical debt is a multifaceted compromise that involves finding a balance between spe...
Semantic Methods In Software Defect Prediction Techniques
Işıkoğlu, Şükrücan Taylan; Koçyiğit, Altan; Department of Software Management (2024-1-1)
The traditional methods in software defect prediction use software metrics that are collected from the source code. However these methods have an important shortcoming: it is possible that two source code segments, where o...
Vulnerability Detection on Solidity Smart Contracts by Using Convolutional Neural Networks
BEKTAŞ, Barış Cem; Acar, Aybar Can; Acar, Aybar Can; Department of Cybersecurity (2023-2-01)
Smart contracts, which are self executing contracts with the terms of the agreement between buyer and seller being directly written into lines of code, have the potential to revolutionize many industries by automating comp...
Citation Formats