Now showing items 1-15 of 15

    • Architecture framework for software safety 

      Gürbüz H.G.; Pala Er, N.; Tekinerdogan, B. (Springer Verlag, 2014)
      Currently, an increasing number of systems are controlled by soft- ware and rely on the correct operation of software. In this context, a safety- critical system is defined as a system in which malfunctioning software could ...
    • Camera sabotage discovery for video surveillance applications 

      Aksay, A.; Temizel, A.; Çetin, A.E. (2007)
      In the recent years, number of surveillance cameras deployed has increased significantly. However it is important that these cameras are functioning as intended and capturing meaningful data. Offenders resort to techniques ...
    • Camera tamper detection using wavelet analysis for video surveillance 

      Aksay, A.; Temizel, A.; Çetin, A. E. (2007)
      It is generally accepted that video surveillance system operators lose their concentration after a short period of time and may miss important events taking place. In addition, many surveillance systems are frequently left ...
    • Computer vision based forest fire detection 

      Uǧur Töreyin, B.; Enis Çetin, A. (2008)
      Lookout posts are commonly installed in the forests all around Turkey and the world. Most of these posts have electricity. Surveillance cameras can be placed on to these surveillance towers to detect possible forest fires. ...
    • Counteracting free riding in Peer-to-Peer networks 

      Karakaya, M.; Körpeoǧlu, I.; Ulusoy, O. (Elsevier BV, 2008-03)
      The existence of a high degree of free riding is a serious threat to Peer-to-Peer (P2P) networks. In this paper, we propose a distributed framework to reduce the adverse effects of free riding on P2P networks. Our solution ...
    • G-free: Defeating return-oriented programming through gadget-less binaries 

      Onarlioglu, K.; Bilge, L.; Lanzi, A.; Balzarotti, D.; Kirda, E. (I E E E Computer Society, 2010)
      Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of ...
    • Keyframe labeling technique for surveillance event classification 

      Şaykol, E.; Baştan M.; Güdükbay U.; Ulusoy, Ö. (S P I E - International Society for Optical Engineering, 2010)
      The huge amount of video data generated by surveillance systems necessitates the use of automatic tools for their efficient analysis, indexing, and retrieval. Automated access to the semantic content of surveillance videos ...
    • A multi-modal video analysis approach for car park fire detection 

      Verstockt, S.; Hoecke, S. V.; Beji, T.; Merci, B.; Gouverneur, B.; Cetin, A. E.; Potter, P. D.; Walle, R. V. D. (Elsevier, 2013)
      In this paper a novel multi-modal flame and smoke detector is proposed for the detection of fire in large open spaces such as car parks. The flame detector is based on the visual and amplitude image of a time-of-flight ...
    • Object tracking under illumination variations using 2D-cepstrum characteristics of the target 

      Cogun F.; Cetin, A.E. (2010)
      Most video processing applications require object tracking as it is the base operation for real-time implementations such as surveillance, monitoring and video compression. Therefore, accurate tracking of an object under ...
    • A robust system for counting people using an infrared sensor and a camera 

      Erden, F.; Alkar, A. Z.; Cetin, A. E. (Elsevier BV, 2015)
      In this paper, a multi-modal solution to the people counting problem in a given area is described. The multi-modal system consists of a differential pyro-electric infrared (PIR) sensor and a camera. Faces in the surveillance ...
    • Safety perspective for supporting architectural design of safety-critical systems 

      Gürbüz H.G.; Tekinerdogan, B.; Pala Er, N. (Springer Verlag, 2014)
      Various software architecture viewpoint approaches have been introduced to model the architecture views for stakeholder concerns. To address quality concerns in software architecture views, an important approach is to ...
    • SeaSpider: Automated information gathering on vessel movements in support of marine intelligence, surveillance, and reconnaissance 

      Tatar, S.; Chapman, D.M.F. (2008)
      SeaSpider is an R&D tool to investigate the development of a software agent that would aid an operator in gathering information about marine vessels from public sources on the Internet. This information would supplement ...
    • A survey on information security threats and solutions for Machine to Machine (M2M) communications 

      Tuna, G.; Kogias, D. G.; Gungor, V. C.; Gezer, C.; Taşkın, E.; Ayday, E. (Academic Press Inc., 2017)
      Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...
    • Video based fire detection at night 

      Taşdemir, K.; Günay O.; Töreyin, B.U.; Çetin, A.E. (2009)
      There has been increasing interest in the study of video based fire detection as video based surveillance systems become widely available for indoor and outdoor monitoring applications. Video based fire detection methods ...
    • Video fire detection-Review 

      Çetin, A. E.; Dimitropoulos, K.; Gouverneur, B.; Grammalidis, N.; Günay, O.; Habiboğlu, Y. H.; Töreyin, B. U.; Verstockt, S. (Elsevier, 2013)
      This is a review article describing the recent developments in Video based Fire Detection (VFD). Video surveillance cameras and computer vision methods are widely used in many security applications. It is also possible to ...