Works matching DE "LINK spam (Internet)"
1
- Information Systems Frontiers, 2013, v. 15, n. 4, p. 613, doi. 10.1007/s10796-012-9381-x
- Chen, Wuhui;
- Paik, Incheon
- Article
2
- Journal of Intelligent Information Systems, 2014, v. 43, n. 1, p. 129, doi. 10.1007/s10844-014-0310-y
- Goh, Kwang;
- Patchmuthu, Ravi;
- Singh, Ashutosh
- Article
3
- JMIR Human Factors, 2024, v. 11, p. 1, doi. 10.2196/58051
- Naudé, Bérangère;
- Rigaud, Anne-Sophie;
- Pino, Maribel
- Article
4
- Review of Computer Engineering Studies, 2020, v. 7, n. 4, p. 91, doi. 10.18280/rces.070403
- Chirra, Venkata RamiReddy;
- Maddiboyina, Hoolda Daniel;
- Dasari, Yakobu;
- Aluru, Ranganadhareddy
- Article
5
- Michigan Medicine, 2016, v. 115, n. 3, p. 12
- Article
6
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 3, p. 57, doi. 10.1080/19393555.2014.931487
- Canfora, Gerardo;
- Mercaldo, Francesco;
- Visaggio, Corrado Aaron;
- Di Notte, Paolo
- Article
7
- Journal of Network & Systems Management, 2018, v. 26, n. 3, p. 616, doi. 10.1007/s10922-017-9436-x
- Article
8
- Electronic Commerce Research, 2017, v. 17, n. 1, p. 51, doi. 10.1007/s10660-016-9244-5
- Song, Long;
- Lau, Raymond;
- Kwok, Ron;
- Mirkovski, Kristijan;
- Dou, Wenyu
- Article
9
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 4, p. 2106, doi. 10.3906/elk-1401-202
- PATCHMUTHU, Ravi Kumar;
- KUMAR SINGH, Ashutosh;
- MOHAN, Anand
- Article
10
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 5, p. 1445, doi. 10.3837/tiis.2012.05.011
- HyunCheol Jeong;
- Huy Kang Kim;
- Sangjin Lee;
- Eunjin Kim
- Article
11
- Security & Communication Networks, 2015, v. 8, n. 2, p. 176, doi. 10.1002/sec.970
- Shin, Youngsang;
- Myers, Steven;
- Gupta, Minaxi;
- Radivojac, Predrag
- Article
12
- Code4Lib Journal, 2012, n. 17, p. 1
- Randtke, Wilhelmina;
- Burrell, Matthew D.
- Article
13
- Multimedia Tools & Applications, 2018, v. 77, n. 11, p. 13249, doi. 10.1007/s11042-017-4944-y
- Amir, Amiza;
- Srinivasan, Bala;
- Khan, Asad I.
- Article
14
- Sādhanā: Academy Proceedings in Engineering Sciences, 2016, v. 41, n. 2, p. 193, doi. 10.1007/s12046-015-0460-9
- ROUL, RAJENDRA KUMAR;
- ASTHANA, SHUBHAM ROHAN;
- SHAH, MIT;
- PARIKH, DHRUVESH
- Article
15
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1353, doi. 10.1007/s11277-018-5513-z
- Senthil Murugan, N.;
- Usha Devi, G.
- Article
16
- International Journal of Information Security, 2016, v. 15, n. 5, p. 475, doi. 10.1007/s10207-016-0321-5
- Almaatouq, Abdullah;
- Shmueli, Erez;
- Nouh, Mariam;
- Alabdulkareem, Ahmad;
- Singh, Vivek;
- Alsaleh, Mansour;
- Alarifi, Abdulrahman;
- Alfaris, Anas;
- Pentland, Alex
- Article
17
- Computer Science & Telecommunications, 2014, v. 41, n. 1, p. 3
- Jayanthi, S. K.;
- Sasikala, S.
- Article
18
- ITNOW, 2013, v. 55, n. 2, p. 26, doi. 10.1093/itnow/bwt011
- Article