Works matching DE "PREVENTION of spam email"
1
- Science & Engineering Ethics, 2018, v. 24, n. 2, p. 655, doi. 10.1007/s11948-017-9914-2
- Andoohgin Shahri, Mona;
- Jazi, Mohammad Davarpanah;
- Borchardt, Glenn;
- Dadkhah, Mehdi
- Article
2
- Canadian Veterinary Journal / Revue Vétérinaire Canadienne, 2014, v. 55, n. 3, p. 225
- Article
3
- Pertanika Journal of Science & Technology, 2018, v. 26, n. 3, p. 1355
- Singh, Surender;
- Singh, Ashutosh Kumar
- Article
4
- Allam - es Jogtudomany, 2009, v. 50, n. 1, p. 45
- Szabolcs, Koppányi;
- Patrik, Polefkó
- Article
5
- Review of Computer Engineering Studies, 2020, v. 7, n. 4, p. 91, doi. 10.18280/rces.070403
- Chirra, Venkata RamiReddy;
- Maddiboyina, Hoolda Daniel;
- Dasari, Yakobu;
- Aluru, Ranganadhareddy
- Article
6
- Medical Writing, 2017, v. 26, n. 2, p. 64
- Article
7
- North Carolina Law Review, 2024, v. 102, n. 4, p. 1223
- Article
8
- INGENIARE - Revista Chilena de Ingeniería, 2009, v. 17, n. 3, p. 386
- Agüero, Pablo Daniel;
- Moreira, Jorge Castiñeira;
- Liberatori, Monica;
- Bonadero, Juan Carlos;
- Tull, Juan Carlos
- Article
9
- Seybold Report: Analyzing Publishing Technologies, 2002, v. 2, n. 9, p. 20
- Article
10
- Canadian Journal of Economics, 2013, v. 46, n. 3, p. 881, doi. 10.1111/caje.12043
- Eaton, B. Curtis;
- MacDonald, Ian A.;
- Meriluoto, Laura
- Article
11
- Parliamentarian, 2010, v. 91, n. 4, p. 400
- Article
12
- 2016
- Mazzarello, Sasha;
- Fralick, Michael;
- Clemons, Mark
- Letter to the Editor
13
- Information Resources Management Journal, 2013, v. 26, n. 1, p. 54, doi. 10.4018/irmj.2013010105
- Basto-Fernandes, Vitor;
- Yevseyeva, Iryna;
- Méndez, José R.
- Article
14
- Information Resources Management Journal, 2013, v. 26, n. 1, p. i
- Cruz-Cunha, Maria Manuela;
- Martinho, Ricardo
- Article
15
- Knowledge & Information Systems, 2012, v. 31, n. 1, p. 23, doi. 10.1007/s10115-011-0403-7
- Gomez, Juan;
- Boiy, Erik;
- Moens, Marie-Francine
- Article
16
- Applied Artificial Intelligence, 2010, v. 24, n. 5, p. 443, doi. 10.1080/08839514.2010.481499
- Ghiglieri, Marco;
- Fürnkranz, Johannes
- Article
17
- Strategic Finance, 2003, v. 84, n. 7, p. 53
- Article
18
- Journal of Information Science & Technology, 2005, v. 2, n. 1, p. 49
- Article
19
- Electronics & Communications in Japan, 2012, v. 95, n. 1, p. 8, doi. 10.1002/ecj.10393
- Hisanaga, Yutaka;
- Sugii, Manabu;
- Wang, Yue;
- Osa, Atsushi;
- Miike, Hidetoshi
- Article
20
- Brooklyn Law Review, 2019, v. 84, n. 4, p. 1321
- Article
21
- Multimedia Tools & Applications, 2017, v. 76, n. 16, p. 17371, doi. 10.1007/s11042-017-4511-6
- Sung, Chang;
- Kim, Chi;
- Park, Joo
- Article
22
- Marketing Insights, 2015, v. 27, n. 1, p. 4
- Article
23
- CPA Journal, 2006, v. 76, n. 7, p. 48
- Article
24
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 938
- Algur, Siddu P.;
- Ayachit, N. H.;
- Biradar, Jyoti G.
- Article
25
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 84
- Article
26
- ComputerWorld Hong Kong, 2009, v. 26, n. 4, p. 24
- Article
28
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6587020
- Article
29
- Computing & Informatics, 2014, v. 33, n. 6, p. 1400
- Wuying LIU;
- Lin WANG;
- Mianzhu YI;
- Nan XIE
- Article
30
- World of Computer Science & Information Technology Journal, 2013, v. 3, n. 3, p. 56
- Onomza Waziri, Victor.;
- Idris, Ismaila;
- Danladi, Hahimi;
- Isah, Audu;
- Bashir Abdullahi, Mohammed
- Article
31
- Electronics & Electrical Engineering, 2016, v. 22, n. 4, p. 63, doi. 10.5755/j01.eie.22.4.15921
- Bendorius, Martynas;
- Lagzdinyte-Budnike, Ingrida;
- Paulikas, Kestutis;
- Budnikas, Aurelijus
- Article