Alert button
Picture for Muhammed Fatih Bulut

Muhammed Fatih Bulut

Alert button

Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

Add code
Bookmark button
Alert button
Jun 27, 2023
Asif Imran, Tevfik Kosar, Jaroslaw Zola, Muhammed Fatih Bulut

Figure 1 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 2 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 3 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 4 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Viaarxiv icon

Automated Compliance Blueprint Optimization with Artificial Intelligence

Add code
Bookmark button
Alert button
Jun 22, 2022
Abdulhamid Adebayo, Daby Sow, Muhammed Fatih Bulut

Figure 1 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 2 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 3 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 4 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Viaarxiv icon

Vulnerability Prioritization: An Offensive Security Approach

Add code
Bookmark button
Alert button
Jun 22, 2022
Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek

Figure 1 for Vulnerability Prioritization: An Offensive Security Approach
Figure 2 for Vulnerability Prioritization: An Offensive Security Approach
Figure 3 for Vulnerability Prioritization: An Offensive Security Approach
Figure 4 for Vulnerability Prioritization: An Offensive Security Approach
Viaarxiv icon

Attack Techniques and Threat Identification for Vulnerabilities

Add code
Bookmark button
Alert button
Jun 22, 2022
Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta

Figure 1 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 2 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 3 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 4 for Attack Techniques and Threat Identification for Vulnerabilities
Viaarxiv icon