Yayın: RAISD D4.1 Cross-Analysis: Vulnerability Context_Definition and Guidelines
| dc.contributor.author | Nezih Orhon | |
| dc.contributor.author | ORHON, EROL NEZİH | |
| dc.contributor.author | Tayfun Dalkılıç | |
| dc.contributor.author | Akcakaya, Elif | |
| dc.contributor.author | Elif Akcakaya | |
| dc.contributor.author | Dalkılıç, Tayfun | |
| dc.contributor.author | All Partners | |
| dc.contributor.orcid | 0000-0002-2347-0852 | |
| dc.date.accessioned | 2025-11-13T20:41:29Z | |
| dc.date.issued | 2021-04-14 | |
| dc.identifier.doi | https://doi.org/10.5281/zenodo.6683823 | |
| dc.identifier.openalex | W4287213387 | |
| dc.identifier.uri | https://hdl.handle.net/11421/12671 | |
| dc.identifier.uri | https://doi.org/10.5281/zenodo.6683823 | |
| dc.language.iso | en | |
| dc.relation.ispartof | Zenodo (CERN European Organization for Nuclear Research) | |
| dc.rights | openAccess | |
| dc.subject | Vulnerability (computing) | |
| dc.subject | Context (archaeology) | |
| dc.subject | Vulnerability assessment | |
| dc.subject | Computer science | |
| dc.subject | Geography | |
| dc.subject | Psychology | |
| dc.subject | Computer security | |
| dc.subject | Archaeology | |
| dc.subject | Social psychology | |
| dc.title | RAISD D4.1 Cross-Analysis: Vulnerability Context_Definition and Guidelines | |
| dc.type | report | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5078203073 | |
| local.authorid.openalex | A5015012254 | |
| local.authorid.openalex | A5090473158 |
