Works matching DE "EMAIL spoofing"
1
- Journal of Natural Sciences & Mathematics (JNSM), 2023, v. 8, n. 15/16, p. 307
- BAHTIRI, Yllka;
- BYTYÇI, Enkelejdë;
- IDRIZI, Florim;
- ISMAILI, Shpend;
- SEJFULI-RAMADANI, Nexhibe
- Article
2
- Journal of Government Financial Management, 2017, v. 66, n. 3, p. 61
- Article
3
- Journal of Experimental & Theoretical Artificial Intelligence, 2018, v. 30, n. 6, p. 733, doi. 10.1080/0952813X.2018.1467496
- Article
4
- Georgetown Journal of International Affairs (Georgetown University Press), 2017, v. 18, n. 3, p. 67, doi. 10.1353/gia.2017.0038
- Article
5
- Journal of Polytechnic, 2022, v. 25, n. 2, p. 895, doi. 10.2339/politeknik.976886
- GÖNEN, Serkan;
- SAYAN, Hasan Hüseyin;
- KARACAYILMAZ, Gökçe;
- SİNDİREN, Erhan;
- ÜSTÜNSOY, Furkan;
- ARTUNER, Harun;
- YILMAZ, Ercan Nurcan;
- IŞIK, Mehmet Fatih
- Article
6
- Journal of International Affairs, 2018, v. 71, p. 9
- Article
7
- Computers, Materials & Continua, 2022, v. 72, n. 3, p. 4803, doi. 10.32604/cmc.2022.025310
- Article
8
- Journal of Communication Inquiry, 2018, v. 42, n. 3, p. 218, doi. 10.1177/0196859918771351
- Article
9
- Vanderbilt Law Review, 2019, v. 72, n. 1, p. 391
- Article
10
- Bench & Bar of Minnesota, 2022, v. 79, n. 4, p. 12
- Article
11
- Syntax Idea, 2024, v. 6, n. 10, p. 6407, doi. 10.46799/syntax-idea.v6i10.8053
- Himawan, Randy;
- Zahra, Amalia
- Article
12
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 2, p. 245, doi. 10.3390/jcp2020013
- Di Nocera, Francesco;
- Tempestini, Giorgia
- Article
13
- College & University, 2021, v. 96, n. 3, p. 51
- Article
14
- Journal of Cybersecurity (2579-0072), 2024, v. 6, p. 25, doi. 10.32604/jcs.2023.045859
- Sawe, Lindah;
- Gikandi, Joyce;
- Kamau, John;
- Njuguna, David
- Article
15
- Brooklyn Law Review, 2019, v. 84, n. 4, p. 1321
- Article
16
- ISSA Journal, 2016, v. 14, n. 7, p. 41
- Article
18
- Multimedia Tools & Applications, 2018, v. 77, n. 20, p. 26509, doi. 10.1007/s11042-018-5877-9
- Article
19
- 2017
- Sankhwar, Shweta;
- Pandey, Dhirendra
- Case Study
20
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 567
- Sankhwar, Shweta;
- Pandey, Dhirendra
- Article
21
- Brief, 2017, v. 46, n. 4, p. 63
- Article
22
- Journal of Cyber Security Technology, 2023, v. 7, n. 3, p. 134, doi. 10.1080/23742917.2023.2167276
- Tinubu, Carolyn Oreoluwa;
- Falana, Olorunjube James;
- Oluwumi, Enoch Okikijesu;
- Sodiya, Adesina Simon;
- Rufai, Sodiq Ademola
- Article
23
- Duke Law & Technology Review, 2023, v. 23, n. 1, p. 35
- Article
24
- Issues in Information Systems, 2016, v. 17, n. 1, p. 231
- Slonka, Kevin J.;
- Shrift, Brian F.
- Article