Loading [MathJax]/extensions/MathMenu.js
Ekincan Ufuktepe - IEEE Xplore Author Profile

Showing 1-15 of 15 results

Filter Results

Show

Results

In dynamic and resource-constrained Tactical Edge Network (TEN) environments, where Denied, Disrupted, Intermittent, and Limited Impact (DDIL) conditions prevail, a tailored se-curity approach is vital for real-time decision-making. In this paper, we propose adapting the Zero Trust (ZT) security paradigm to suit TEN settings, focusing on strict access con-trols, continuous entity verification, and...Show More
Collaborative Drone systems (CDS) have the potential to benefit a variety of application areas such as agriculture, military operations, surveillance, and disaster response. At the same time, CDS can pose challenges due to their limited flight time impacted by battery capacities, and constrained edge computation capabilities on-board the drones. Furthermore, an understudied subject relates to when...Show More
Regression testing is one of the most expensive processes in testing. Prioritizing test cases in regression testing is critical for the goal of detecting the faults sooner within a large set of test cases. We propose a test case prioritization (TCP) technique for regression testing called LoM-Score inspired by the Law of Minimum (LoM) from biology. This technique calculates the impact probabilitie...Show More
Throughout the post-PC world, IoT devices and real-time embedded systems have integrated themselves into every aspect of our lives. However, as technology integrates itself, the risk of security vulnerabilities and their impact also grows. Different languages have different susceptibilities to cyberattacks. Programs based on C and C++ are particularly vulnerable to cyberattacks through buffer over...Show More
Change impact analysis evaluates the changes that are made in the software and finds the ripple effects, in other words, finds the affected software components. Code changes and bug fixes can have a high impact on code quality by introducing new vulnerabilities or increasing their severity. A recent high-visibility example of this is the code changes in the log4j web software CVE-2021-45105 to fix...Show More
The COVID-19 pandemic has changed the world in unprecedented ways. Due to its high levels of transmissibility and fatality rates, the Centers for Disease Control and Prevention (CDC) continues to update their recommendations about safe human interaction. However, enforcing these standards using manual labor can be expensive and subjective. Thereby, this study aims to help public establishments enf...Show More
Software product line (SPL) engineering is a widely accepted approach to systematically realizing software reuse in an industrial environment. Feature models, a centerpiece of most SPL engineering techniques, are appropriate to model the variability and the structure of SPLs, but not their behavior. This paper uses the idea to link feature modeling to model-based behavior modeling and to determine...Show More
Change impact analysis analyzes the changes that are made in the software and finds the ripple effects, in other words, finds the affected software components. In this study, we analyze the bug fix change patterns to have a better understanding of what types of changes are common in fixing bugs. To achieve this, we implemented a tool that compares two versions of codes and detects the changes that...Show More
The literature includes several methods to generate test inputs for Boolean expressions. The effectiveness of those methods needs to be analyzed by extensive comparisons. To this end, mutation analysis is often benefited by applying a distinctively selected set of mutants on each test generation method. Mutation analysis provides substantive information about the effectiveness of a test suite by i...Show More
Shadows, motion parallax, and occlusions pose significant challenges to vision tasks in wide area motion imagery (WAMI) including object identification and tracking. Although there are many successful shadow detection approaches that work well in indoor scenes, close range outdoor scenes, and spaceborne satellite images, the methods tend to fail in intermediate altitude aerial WAMI. We propose an ...Show More
The test case prioritization (TCP) problem is defined as determining an execution order of test cases so that important tests are executed early. Different metrics have been proposed to measure importance of test cases. While coverage and fault-detection based measures have benefits and have been used in a lot of studies, mutation kill-based measures have emerged in TCP recently, since they have b...Show More
Code changes are one of the essential processes of software evolution. These changes are performed to fix bugs, improve quality of software, and provide a better user experience. However, such changes made in code could lead to ripple effects that can cause unwanted behavior. To prevent such issues occurring after code changes, code change prediction, change impact analysis techniques are used. Th...Show More
With the recent advances in video sensor technologies, emergence of new applications associated with these technologies, and demand for automated video analytics have increased the need for ground-truth annotations. Researchers attempt to explore different methodologies and algorithms on different challenging datasets. Ground-truth annotations are needed for quantitative evaluation and comparison ...Show More
Change impact analysis plays an important role in identifying potential affected areas that are caused by changes that are made in a software. Most of the existing change impact analysis techniques are based on architectural design and change history. However, source code-based change impact analysis studies are very few and they have shown higher precision in their results. In this study, a stati...Show More
An automation architecture for Bayesian Network based test case prioritization is designed for software written in Java programming language following the approach proposed by Mirarab and Tahvildari [2]. The architecture is implemented as an integration of a series of tools and called Bayesian Network based test case prioritization and execution platform. The platform is triggered by a change in t...Show More