Works matching DE "EMAIL security"
1
- IETE Journal of Research, 2025, v. 71, n. 4, p. 1432, doi. 10.1080/03772063.2025.2451060
- Naga Priyadarsini, R.;
- Tyagi, Bhawana;
- Harsath, B. R.;
- Vinoth Kannan, R.
- Article
2
- Electronics (2079-9292), 2025, v. 14, n. 10, p. 2034, doi. 10.3390/electronics14102034
- Oh, Insu;
- Sahlabadi, Mahdi;
- Yim, Kangbin;
- Lee, Sunyoung
- Article
3
- Decision Analysis, 2022, v. 19, n. 2, p. 99, doi. 10.1287/deca.2021.0442
- Wu, Yong;
- Xu, Mengyao;
- Cheng, Dong;
- Dai, Tao
- Article
4
- Government Technology, 2024, v. 37, n. 4, p. 50
- Article
5
- Government Technology, 2024, v. 37, n. 4, p. 46
- Article
6
- Government Technology, 2022, v. 35, n. 7, p. 48
- ADAMS, ANDREW;
- MILLER, BEN
- Article
7
- Government Technology, 2022, v. 35, n. 5, p. 66
- Article
8
- Government Technology, 2020, v. 33, n. 7, p. 56
- Article
9
- Government Technology, 2017, v. 30, n. 5, p. 48
- Article
10
- ACME: An International Journal for Critical Geographies, 2019, v. 18, n. 3, p. 642
- Elinoff, Eli;
- Gillen, Jamie
- Article
11
- International Journal of Intelligent Computing & Information Sciences, 2024, v. 24, n. 4, p. 1, doi. 10.21608/ijicis.2024.321043.1355
- Raihen, Md Nurul;
- Rana, Shivani;
- Kadir, Md Abdul;
- Akter, Sultana
- Article
12
- Journal of Network & Information Security, 2024, v. 12, n. 1, p. 20
- Article
13
- Journal of Network & Information Security, 2023, v. 11, n. 1, p. 28
- Tanguturi, Ravi;
- Bhimini, Saraswati
- Article
14
- Traitement du Signal, 2024, v. 41, n. 1, p. 519, doi. 10.18280/ts.410147
- Olewi, Huda Ismail;
- Msallam, Mohammed Majid;
- Salim, Sarah Kareem;
- Al-Behadili, Hasanain A. H.
- Article
15
- Traitement du Signal, 2019, v. 36, n. 1, p. 45, doi. 10.18280/ts.360106
- Oulaya, Berrak;
- Aissa, Belmeguenai;
- Salim, Ouchtati
- Article
16
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 1, p. 253, doi. 10.18280/isi.290125
- Article
17
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) / Chongqing Youdian Daxue Xuebao (Ziran Kexue Ban), 2023, v. 35, n. 2, p. 352, doi. 10.3979/j.issn.1673-825X.202109210335
- Article
18
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 3, p. 226, doi. 10.15276/imms.v12.no3.226
- Симонова, О. М.;
- Бобок, І. І.
- Article
19
- 2021
- Bennett, Wendy L;
- Bramante, Carolyn T;
- Rothenberger, Scott D;
- Kraschnewski, Jennifer L;
- Herring, Sharon J;
- Lent, Michelle R;
- Clark, Jeanne M;
- Conroy, Molly B;
- Lehmann, Harold;
- Cappella, Nickie;
- Gauvey-Kern, Megan;
- McCullough, Jody;
- McTigue, Kathleen M
- journal article
21
- Acta Informatica, 2019, v. 56, n. 6, p. 471, doi. 10.1007/s00236-018-0322-0
- Chen, Huiyan;
- Zhang, Chenchen
- Article
22
- Computer und Recht, 2025, v. 41, n. 3, p. 196, doi. 10.9785/cr-2025-410318
- Article
23
- Computer und Recht, 2024, v. 40, n. 8, p. 515, doi. 10.9785/cr-2024-400807
- Article
24
- International Journal of Network Management, 2024, v. 34, n. 5, p. 1, doi. 10.1002/nem.2289
- Vidhya, S.;
- Siva Raja, P. M.;
- Sumithra, R. P.
- Article
25
- International Journal of Network Management, 2022, v. 32, n. 2, p. 1, doi. 10.1002/nem.2180
- Ghaffari, Fariba;
- Gilani, Komal;
- Bertin, Emmanuel;
- Crespi, Noel
- Article
26
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/6546004
- Sun, Yan;
- Yin, Lihua;
- Ma, Ying;
- Wang, Chonghua
- Article
27
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6485195
- Article
28
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1343766
- Liu, Qingfang;
- Kang, Baosheng;
- Hua, Qiaozhi;
- Wen, Zheng;
- Li, Haipeng
- Article
29
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/5803026
- Qian, Mingzhu;
- Wang, Xiaobao
- Article
30
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/2213336
- Khan, Mohammad Monirujjaman;
- RoJa, Nesat Tasneem;
- Almalki, Faris A.;
- Aljohani, Maha
- Article
31
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4066761
- Article
32
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1699657
- Shin, Youngsup;
- Kim, Kyoungmin;
- Lee, Jemin Justin;
- Lee, Kyungho
- Article
33
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6737942
- Liu, Xiaoguang;
- Yan, Jun;
- Shan, Shuqiang;
- Wu, Rongjun
- Article
34
- Information (2078-2489), 2020, v. 11, n. 1, p. 17, doi. 10.3390/info11010017
- Husamaldin, Laden;
- Saeed, Nagham
- Article
35
- Military Technical Courier / Vojnotehnicki Glasnik, 2023, v. 71, n. 3, p. 748, doi. 10.5937/vojtehg71-44245
- Zajeganović, Marija B.;
- Vugdelija, Natalija J.;
- Stefanović, Radiša R.;
- Kostić, Silva M.;
- Miljković, Uroš D.;
- Mach, Georg G.
- Article
36
- Iraqi Journal for Electrical & Electronic Engineering, 2021, v. 17, n. 1, p. 125, doi. 10.37917/ijeee.17.1.15
- Alzuwaini, Mustafa H.;
- Yassin, Ali A.
- Article
37
- Earth Science Informatics, 2023, v. 16, n. 2, p. 1195, doi. 10.1007/s12145-023-00942-8
- Cao, Hongtang;
- Guo, Ying;
- Li, Fei;
- Zhang, Keyi
- Article
38
- IADIS International Journal on WWW/Internet, 2021, v. 19, n. 1, p. 85, doi. 10.33965/ijwi_202119106
- Article
39
- Journal of Commercial Biotechnology, 2023, v. 28, n. 2, p. 27, doi. 10.5912/jcb1394
- Article
40
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 2, p. 1106, doi. 10.1007/s12083-023-01459-z
- Banaeian Far, Saeed;
- Rajabzadeh Asaar, Maryam;
- Haghbin, Afrooz
- Article
41
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 2, p. 900, doi. 10.1007/s12083-023-01449-1
- Article
42
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 5, p. 2961, doi. 10.1007/s12083-021-01150-1
- Kamboj, Priyanka;
- Khare, Shivang;
- Pal, Sujata
- Article
43
- ComputerWorld Hong Kong, 2008, v. 25, n. 9, p. 26
- Article
44
- Crime, Media, Culture, 2020, v. 16, n. 1, p. 33, doi. 10.1177/1741659018820562
- Harkin, Diarmaid;
- Molnar, Adam;
- Vowles, Erica
- Article
45
- Australasian Journal of Information Systems, 2022, v. 26, p. 1, doi. 10.3127/ajis.v26i0.3615
- Ackerley, Mitchell;
- Morrison, Ben W.;
- Ingrey, Kate;
- Wiggins, Mark W.;
- Bayl-Smith, Piers;
- Morrison, Natalie M. V.
- Article
46
- Australasian Journal of Information Systems, 2021, v. 25, p. 1, doi. 10.3127/ajis.v25i0.2177
- Pham, Hiep Cong;
- Ulhaq, Irfan;
- Minh Nhat Nguyen;
- Nkhoma, Mathews
- Article
47
- Australasian Journal of Information Systems, 2006, v. 14, n. 1, p. 81, doi. 10.3127/ajis.v14i1.9
- Bryant, Kay;
- Campbell, John
- Article
48
- Urology Times, 2000, v. 28, n. 11, p. 44
- Article
49
- Journal of Management Information Systems, 2020, v. 37, n. 3, p. 668, doi. 10.1080/07421222.2020.1790185
- Zhuang, Yunhui;
- Choi, Yunsik;
- He, Shu;
- Leung, Alvin Chung Man;
- Lee, Gene Moo;
- Whinston, Andrew
- Article
50
- Journal of Management Information Systems, 2020, v. 37, n. 3, p. 598, doi. 10.1080/07421222.2020.1790176
- Kauffman, Robert J.;
- Weber, Thomas A.
- Article