Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentEmail verificata su kent.ac.uk
- Kemal BıçakcıProfessor, Istanbul Technical UniversityEmail verificata su itu.edu.tr
- Virginia N. L. FranqueiraUniversity of KentEmail verificata su kent.ac.uk
- Yang LuYork St John UniversityEmail verificata su yorksj.ac.uk
- Rahime Belen SaglamUniversity of East LondonEmail verificata su uel.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentEmail verificata su kent.ac.uk
- Hakan Ezgi KızılözGoogleEmail verificata su etu.edu.tr
- Yusuf UZUNAYPhD from Middle East Technical UniversityEmail verificata su afad.gov.tr
- Haiyue YuanResearch Associate, Institute of Cyber Security for Society, University of KentEmail verificata su kent.ac.uk
- Meryem BagriacikUniversity of KentEmail verificata su kent.ac.uk
- Sophie KalebaUniversity of KentEmail verificata su kent.ac.uk
- Halit OğuztüzünMiddle East Technical University, Dept. of Computer EngineeringEmail verificata su ceng.metu.edu.tr
- Mahdi Saeedi NikooEindhoven University of TechnologyEmail verificata su tue.nl
- Yavuz Selim KartalGESIS – Leibniz Institute for the Social SciencesEmail verificata su gesis.org
- Keenan JonesPhD Student, University of KentEmail verificata su kent.ac.uk
- Can BaşkentMiddlesex University, LondonEmail verificata su mdx.ac.uk
- Lisa BonhemePostdoctoral researcher, IARC, WHOEmail verificata su iarc.who.int