Graduate School of Informatics, Term Project

Browse
Search within this collection:

Filters

Entity Type
Project (27)

Has File(s)
Yes (27)

Author
Akgündüz, Okan (1)
Aktaş, Utku (1)
Aktepe, Semih Can (1)
akçören, berkay (1)
Alzariqi, Abdullah Talat Ahmed Mohammed (1)

Subject
Blockchain (2)
Deep Learning, (2)
LLM (2)
Smart Contracts (2)
3D Conv LSTM (1)

Date Issued
2021 - 2025 (27)

Item Type
Term Project (27)

Recent Submissions

A PROOF OF CONCEPT FOR ML-DRIVEN PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) AUDIT SYSTEMS
AVCI, ZEYNEL ABIDIN; Tezcan, Cihangir; Department of Cybersecurity (2025-6-25)
Today, PCI DSS audits are mostly manual, which takes a lot of time and is often prone to mistakes. Problems like slow evidence collection, inconsistent policy reviews, and late threat detection can leave gaps in compliance...
ZERO TRUST ARCHITECTURE IN ENTERPRISE NETWORKS WITH SOCIO-TECHNICAL PERSPECTIVE
Demirkol, Jülide Nazlı; Özkan Yıldırım, Sevgi; Department of Cybersecurity (2025-6-12)
In enterprise organizations, network architecture is a key component. While traditional network architecture based on perimeters, it sees trusted inside of the castle and make it vulnerable to insider threats. Zero Trust A...
PROMPT INJECTION ATTACKS ON LARGE LANGUAGE MODELS: A SYSTEMATIC LITERATURE REVIEW
Bayhan, Fatih; Tezcan, Cihangir; Department of Cybersecurity (2025-6-11)
The use of Large Language Models has increased significantly after the release of ChatGPT in 2022. LLMs are used in various applications including chatbots and generative artificial intelligence applications. LLMs are inte...
A Review of LLM Security: Threats and Mitigations
Günay, Bengi; Tezcan, Cihangir; Department of Cybersecurity (2025-1-23)
Large Language Models (LLMs) are advanced AI systems trained on massive datasets to process and generate natural language. These models can understand, summarize, and create human-like text with remarkable accuracy. Sinc...
JAMMER DETECTION IN AUTONOMOUS VEHICLES WITH MACHINE LEARNING
Demiryürek, Mert; Taşkaya Temizel, Tuğba; Department of Information Systems (2025-1-23)
Wireless communication systems of autonomous vehicles may be vulnerable to threats such as jammer attacks. As a result of these attacks, operational failures and security problems may occur. This study aims to classify whi...
A SECURITY HARDENING SURVEY FOR MICROSOFT SQL SERVER DATABASE MANAGEMENT SYSTEM
Baş, Berk; Tezcan, Cihangir; Department of Cybersecurity (2025-1-16)
Database management systems are indispensable to almost every organization that maintains an IT infrastructure. For this reason, organizations need to ensure database management systems’ security and the security of data...
ASSESSING ADVANCED RETRIEVALAUGMENTED GENERATION TECHNIQUES FOR QUESTION ANSWERING: A CASE STUDY ON GOVERNMENTAL SERVICES
Alzariqi, Abdullah Talat Ahmed Mohammed; Taşkaya Temizel, Tuğba; Department of Information Systems (2025-1-15)
This case study evaluates advanced Retrieval-Augmented Generation (RAG) methods to enhance question answering in conversational AI for government services, focusing on data from the Ministry of Health and Prevention. It as...
A Survey on Password-free Authentication Method: Passkey
Doğan, Sait Göktuğ; Tezcan, Cihangir; Department of Cybersecurity (2025-1-15)
When a need for to authenticate someone or something, the first answer that comes to mind is to use passwords. While implemented and used properly, passwords are more than enough to securely authenticate. But like everythi...
API Security Guideline for Developers and Product Owners
Akgündüz, Okan; Tezcan, Cihangir; Department of Cognitive Sciences (2025-1-10)
This report provides a survey for security topics, practices, and recommendations to consider when designing, developing, and maintaining an API service. It is primarily intended for developers, product owners, and other s...
Security Assessment of the Smartcard Systems at Middle East Technical University
akçören, berkay; Tezcan, Cihangir; Department of Cybersecurity (2025-1-10)
Smartcards are portable devices that can communicate wirelessly and contain microchips capable of transferring, processing or storing data. They serve practical and reliable solutions for everyday problems such as identifi...
METATRANSCRIPTOMICS ANALYSIS USING MICROBIOME RNA-SEQ DATA
Köseoğlu, Aysu; Acar, Aybar Can; Department of Medical Informatics (2024-6-14)
This project aimed to understand Coprothermobacter proteolyticus and explore meta transcriptomics analysis using microbiome RNA sequencing (RNA-seq). Additionally, the project emphasized the importance of training data for...
Using Deep Learning in Detecting Network Attacks
Vahi, Arsalan; Baykal, Nazife; Department of Cybersecurity (2024-6)
Deep learning significantly enhances network attack detection by identifying and analyzing patterns and anomalies in network traffic. Traditional network security methods fail to recognize evolving threats; On the other ha...
PathFinder - An Intelligent Algorithm for MCDC Test-Path Generation
Şimşekoğlu, İsmail; Koçyiğit, Altan; Department of Software Management (2024-1-31)
Introducing Pathfinder, an innovative automated tool designed for generating comprehensive test cases in the realm of C language source codes. The primary objective is to fulfill Modified Condition/Decision Coverage (MC/DC...
USAGE AREAS AND POTENTIAL RISKS OF ADOPTING LLM TOOLS IN SOFTWARE PROJECTS
Çobanoğlu, İpek; Özcan Top, Özden; Department of Information Systems (2024-1-30)
There is widespread use of Large Language Models (LLM) in various industries. However, the legal and ethical issues and risks of using LLM in projects are unclear. This study investigates the usage areas of LLM in software...
Smart Contract Vulnerabilities
Özgen, Mustafa Uğur; Tezcan, Cihangir; Department of Cybersecurity (2024-1-26)
Various industries, particularly financial technologies, are adopting blockchain to create decentralized applications through smart contracts due to its popularity and features such as immutability, pseudo-anonymity, trans...
Predicting Alzheimer's Disease Stage Transformations 12 Months in Advance using 3D Convolutional LSTM based on 3D Magnetic Resonance Images
Erdemir, Elifnur; Aydın Son, Yeşim; Department of Medical Informatics (2024-1-25)
This study evaluates the ability to predict the transition from the healthy cognitive stage to the Alzheimer's stage using a 3D LSTM model. The model was trained on a data set created from MR images taken at different time...
Process, Technology and Human Aspects of a Security Operations Center
Erdıvan, Cem; Acar, Aybar Can; Department of Cybersecurity (2024-1-24)
This report presents the high level aspects of any security operations center and tries to define a baseline for SOC processes, technologies to be used and roles to be assigned for an effective and efficient service. This ...
Zero-knowledge Proofs: zk-SNARK and Applications
Fidan, Mehtap; Tezcan, Cihangir; Department of Cybersecurity (2024-1-24)
As technology advances, the need for secure and private communication becomes crucial. Zero-knowledge proofs (ZKPs) offer a solution to this challenge by allowing entities to validate information without disclosing sensiti...
A REFERENCE ARCHITECTURE FOR SIMULATION-BASED DIGITAL TWINS
Kandaz, Murat; Koçyiğit, Altan; Department of Software Management (2024-1-21)
Digital twins can be based on data, physics, rules, behaviors, and geometry models/features. Together with the conventional data-based approach that has been used for decades, other models that are generally based on engin...
IDENTIFYING TECHNICAL DEBT AND TOOLS FOR TECHNICAL DEBT MANAGEMENT IN SOFTWARE DEVELOPMENT
Muratdağı, Tolga; Koçyiğit, Altan; Department of Software Management (2024-1-19)
This term project explores the concept of technical debt in software development, as initially articulated by Ward Cunningham in 1992. Technical debt is a multifaceted compromise that involves finding a balance between spe...
Citation Formats