Academic literature on the topic 'Email Misuse'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email Misuse.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Email Misuse"
Chiluwa, Innocent. "Nigerian English in informal email messages." English World-Wide 31, no. 1 (2010): 40–61. http://dx.doi.org/10.1075/eww.31.1.02chi.
Full textFarooqi, Shehroze, Maaz Musa, Zubair Shafiq, and Fareed Zaffar. "CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 336–54. http://dx.doi.org/10.2478/popets-2020-0076.
Full textBabeetha, Muruganantham, Modi Akash, Gehlot Eshwesh, and Botikar Abhishek. "Cloud Computing Technique Applied to Detect Cyber-Attacks on Web Application." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1498–500. https://doi.org/10.35940/ijeat.D7538.049420.
Full textKarlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.
Full textKameg, Brayden N., Dawn Lindsay, Heeyoung Lee, and Ann Mitchell. "Substance Use and Exposure to Adverse Childhood Experiences in Undergraduate and Graduate Nursing Students." Journal of the American Psychiatric Nurses Association 26, no. 4 (2020): 354–63. http://dx.doi.org/10.1177/1078390320905669.
Full textSoma Niloy Ghosh and Jayesh V Jawade. "Comparative analysis on different phishing website detection techniques." International Journal of Frontiers in Engineering and Technology Research 8, no. 2 (2025): 055–62. https://doi.org/10.53294/ijfetr.2025.8.2.0036.
Full textOktaviani, Ayu Nur, Asep Id Hadiana, and Melina Melina. "Enhancing Email Client Security with HMAC and PGP Integration to Mitigate Cyberattack Risks." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 311–17. https://doi.org/10.46336/ijqrm.v5i3.758.
Full textYoun, Seongwook. "SPONGY (SPam ONtoloGY): Email Classification Using Two-Level Dynamic Ontology." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/414583.
Full textThomas, Merly, and B. B. Meshram. "Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders." International Journal of Network Security & Its Applications 16, no. 1 (2024): 21–33. http://dx.doi.org/10.5121/ijnsa.2024.16102.
Full textFavre, G., N. Bausch Becker, D. Giacco, et al. "ECP09-03 - Information technologies in psychiatry." European Psychiatry 26, S2 (2011): 1807. http://dx.doi.org/10.1016/s0924-9338(11)73511-8.
Full textDissertations / Theses on the topic "Email Misuse"
Chang, Chun-Pin, and 張峻賓. "Misuse detection of new malicious Email viruses." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/51457641028195182648.
Full textBooks on the topic "Email Misuse"
Shorter, Edward, and Max Fink. Emil Kraepelin. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190881191.003.0004.
Full textBarnhurst, Kevin G. Modern Events Resumed Online. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040184.003.0009.
Full textBook chapters on the topic "Email Misuse"
Guerraoui, Rachid, and Nirupam Gupta. "Robust and Private Federated Learning on LLMs." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_21.
Full textRafiee, Hosnieh, Martin von Löwis, and Christoph Meinel. "Cryptography in Electronic Mail." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch016.
Full textMACDONALD, L. "Legal Liabilities Arising From Misuse of Email and the Internet." In Tolley's Managing Email & Internet Use. Elsevier, 2004. http://dx.doi.org/10.1016/b978-0-7545-2443-4.50004-3.
Full textSánchez, Yaira K. Rivera, and Steven A. Demurjian. "Towards User Authentication Requirements for Mobile Computing." In Data Analytics in Medicine. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1204-3.ch062.
Full textWijngaard, Peter, Ina Wensveen, Anne Basten, and Tim de Vries. "Projects without Email, Is that Possible?" In Strategic Integration of Social Media into Project Management Practice. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9867-3.ch013.
Full textSafren, Steven A., Susan E. Sprich, Carol A. Perlman, and Michael W. Otto. "Organizational Systems." In Mastering Your Adult ADHD, edited by Steven A. Safren, Susan E. Sprich, Carol A. Perlman, and Michael W. Otto. Oxford University Press, 2017. http://dx.doi.org/10.1093/med:psych/9780190235567.003.0007.
Full textKagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "PRISM." In Improving the Safety and Efficiency of Emergency Services. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2535-7.ch009.
Full textMeredith, Dennis. "Make the Interview Work for You." In Explaining Research. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197571316.003.0025.
Full textAstor, Ron Avi, Linda Jacobson, Stephanie L. Wrabel, Rami Benbenishty, and Diana Pineda. "Preparing for the Next Move." In Welcoming Practices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190845513.003.0016.
Full textConference papers on the topic "Email Misuse"
Liu, Wayne W. "Identifying and Addressing Rogue Servers in Countering Internet Email Misuse." In 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, 2010. http://dx.doi.org/10.1109/sadfe.2010.12.
Full textWinkels, Alvaro, Marko Schuba, Tim Höner, Sacha Hack, and Georg Neugebauer. "On the Lack of Phishing Misuse Prevention in Public Artificial Intelligence Tools." In 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005893.
Full textBaumgaertner, Lars, Jonas Hochst, Matthias Leinweber, and Bernd Freisleben. "How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.386.
Full textVugdelija, Natalija, Nikola Nedeljković, and Nenad Kojić. "Security of Data and Web Applications during COVID-19." In Fifth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2021. http://dx.doi.org/10.31410/itema.2021.1.
Full textMomčilov, Milena. "Odgovornost za štetu prouzrokovanu zloupotrebom elektronskog memoranduma." In Prouzrokovanje štete, naknada štete i osiguranje. Institut za uporedno pravo, Udruženje za odštetno pravo, Pravosudna akademija, 2023. http://dx.doi.org/10.56461/zr_23.ons.07.
Full textBinnani, Ojaswi. "Author Identification using Traditional Machine Learning Models." In 9th International Conference on Computer Science and Information Technology (CSIT 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121402.
Full textBaryshnikova, Vera, and Lyudmila Filina-Dawidovych. "Digitalization urgency of the Danube ports." In X International scientific-practical conference PROBLEMS OF TRANSPORT LOGISTICS DEVELOPMENT. Odessa National Maritime University, 2024. http://dx.doi.org/10.31375/978-966-7716-95-0-48-49.
Full textMehdy, A. K. M. Nuhil, and Hoda Mehrpouyan. "A Multi-Input Multi-Output Transformer-Based Hybrid Neural Network for Multi-Class Privacy Disclosure Detection." In 2nd International Conference on Machine Learning Techniques and NLP (MLNLP 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111419.
Full textChollet, Gérard, Hugues Sansen, Yannis Tevissen, et al. "Privacy Preserving Personal Assistant with On-Device Diarization and Spoken Dialogue System for Home and beyond." In Human Interaction and Emerging Technologies (IHIET-AI 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004577.
Full text