Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley and Robert K. Cunningham
,” http://www.theverge.com/2014/9/1/6092089/nude-celebrity-hack, Sep. 2014.
 B. Krebs, “The target breach, by the numbers,” Krebs on Security, vol. 6, 2014.
 “Newly disclosed N.S.A. files detail partnerships with AT&T and Verizon,” The New York Times, 2015.
 K. M. Sullivan, “But doctor, I still have both feet! Remedial problems faced by victims of medical identity theft,” American Journal of Law & Medicine, vol. 35, no. 4, 2009.
 C. Apgar, G. Apple, L. Ayers, M. Berntsen, R. Busch, J
Jonathan Rusert, Osama Khalid, Dat Hong, Zubair Shafiq and Padmini Srinivasan
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management , CIKM ’17, pages 1279–1288, New York, NY, USA, 2017. ACM.
 N. Confessore. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far, The New York Times. https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html , 2018.
 M. Dredze, M. Osborne, and P. Kambadur. Geolocation for Twitter: Timing Matters. In NAACL-HLT , 2016.
 D. Flatow, M. Naaman, K. E. Xie, Y. Volkovich, and Y. Kanza. On the accuracy of hyper
) Friendship and mobility: User movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11), pp 1082–1090
 Cichocki A, Zdunek R, Phan AH, Amari S (2009) Nonnegative Matrix and Tensor Factorizations: Applications to Exploratory Multi-way Data Analysis and Blind Source Separation. Wiley
 Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences (PNAS) 106
 E. N. Forsythand and C. H. Martell, “Lexical and discourse analysis of online chat dialog,” in Proceedings of the International Conference on Semantic Computing, ICSC ’07, (Washington, DC, USA), pp. 19-26, IEEE Computer Society, 2007.
 S. Bird, E. Klein, and E. Loper, Natural Language Processing with Python. O’Reilly Media, Inc., 1st ed., 2009.
 J. Munkres, “Algorithms for the assignment and transportation problems,” 1957.
 N. Zhang, K. Yuan, M. Naveed, X. Zhou, and X. Wang
B. Serrien, R. Clijsen, S. Anders, M. Goossens and J-P. Baeyens
. Sports Medicine (Auckland, N.Z.) , 43 (3), 167–78. doi:10.1007/s40279-012-0011-z
Stergiou, N., & Decker, L. M. (2011). Human movement variability, nonlinear dynamics, and pathology: is there a connection? Human Movement Science , 30 (5), 869–88. doi:10.1016/j.humov.2011.06.002
van den Tillaar, R., & Ettema, G. (2003). Instructions emphasizing velocity, accuracy or both on kinematics of overarm throwing by experienced team handball players. Perceptual and Motor Skills , 97 , 731–742.
van den Tillaar, R., & Ettema, G. (2004). A force
A. Vales-Vázquez, C. Casal-López, P. Gómez-Rodríguez and H. Blanco-Pita
soccer. Human Movement Science, 32 , 808–821.
Bradley P.S., Bendiksen M., Dellal A., Mohr M., Wilkie A., Datson N., ... Krustrup P. (2014). The application of the Yo-Yo intermittent endurance level 2 test to elite female soccer populations. Scandinavian Journal of Medicine & Science in Sports, 24 (1), 43-54.
Castagna, C., Impellizzeri, F., Cecchini, E., Rampinini, E., & Alvarez, J.C. (2009). Effects of intermittent-endurance fitness on match performance in young male soccer players. Journal of Strength and Conditioning Research, 23 (7), 1954
Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi and Andrei Sabelfeld
, Izmir, Turkey, July 21-23, 2015 , pages 14–21, 2015.
 V. Kolesnikov, R. Kumaresan, M. Rosulek, and N. Trieu. Efficient batched oblivious prf with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security , pages 818–829. ACM, 2016.
 V. Kolesnikov, R. Kumaresan, M. Rosulek, and N. Trieu. Efficient batched oblivious PRF with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria
plants that have grown over the years. Therefore, the population in Konya metropolitan area has recently increased very fast.
The study area was defined by a rectangle with cross-corner of geographical coordinates of 37°53’26.67"N latitude, 32°28’37.38"E longitude and 37°52’38.30"N latitude, 32°29’39.11"E longitude. Its dimensions are 1.5 km × 1.5 km, or 2.25 km 2 . It largely includes houses and trade buildings, but it also includes tramway and railway networks, asphalt pavement, green fields and cemetery areas of Musalla ( Figure 1 ).
 D. P. D. Farias and N. Megiddo, “Combining expert advice in reactive environments,” J. ACM, vol. 53, no. 5, pp. 762-799, Sep. 2006. [Online]. Available: http://doi.acm.org/10.1145/1183907.1183911
 Apple Support, “iOS: Understanding iBeacon,” https://support.apple.com/en-gb/HT202880, Feb. 2015.
 R. Rodrigues, D. Barnard-Wills, D. Wright, P. De Hert, V. Papakonstantinou, L. Beslay, E. JRC-IPSC, N. Dubois, and E. JUST, “EU privacy seals project,” Publications Office of the European Union, 2013.
 P. Higgins
–432. Springer, January 2003.
 Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Colin Boyd, editor, Advances in Cryptology—ASIACRYPT , number 2248 in Lecture Notes in Computer Science, pages 514–532. Springer, January 2001.
 Philippe Boucher, Adam Shostack, and Ian Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
 Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich. How to win the clonewars: efficient periodic n