Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
- Kemal BıçakcıProfessor, Istanbul Technical UniversityVerified email at itu.edu.tr
- Yang LuYork St John UniversityVerified email at yorksj.ac.uk
- Rahime Belen SaglamUniversity of East LondonVerified email at uel.ac.uk
- Virginia N. L. FranqueiraUniversity of KentVerified email at kent.ac.uk
- Jason R.C. NurseReader in Cyber Security, University of KentVerified email at kent.ac.uk
- Hakan Ezgi KızılözGoogleVerified email at etu.edu.tr
- Yusuf UZUNAYPhD from Middle East Technical UniversityVerified email at afad.gov.tr
- Haiyue YuanResearch Associate, Institute of Cyber Security for Society, University of KentVerified email at kent.ac.uk
- Meryem BagriacikUniversity of KentVerified email at kent.ac.uk
- Sophie KalebaUniversity of KentVerified email at kent.ac.uk
- Halit OğuztüzünMiddle East Technical University, Dept. of Computer EngineeringVerified email at ceng.metu.edu.tr
- Mahdi Saeedi NikooEindhoven University of TechnologyVerified email at tue.nl
- Yavuz Selim KartalGESIS – Leibniz Institute for the Social SciencesVerified email at gesis.org
- Keenan JonesPhD Student, University of KentVerified email at kent.ac.uk
- Can BaşkentMiddlesex University, LondonVerified email at mdx.ac.uk
- Lisa BonhemePostdoctoral researcher, IARC, WHOVerified email at iarc.who.int