Academic literature on the topic 'Email Proliferation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email Proliferation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Email Proliferation"
Dr.A.Shaji, George. "The Digital Carbon Footprint: Examining Email Proliferation and its Socio-Environmental Impact." Partners Universal Multidisciplinary Research Journal (PUMRJ) 02, no. 03 (2025): 160–82. https://doi.org/10.5281/zenodo.15477192.
Full textJoglekar, Pushkar, Janhavi Rajurkar, Madhuri Shinde, Pranav Tayde, and Ved Gadmade. "Machine Learning Based Email Spam Detection: Achieving High Accuracy and Efficiency." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 3575–80. http://dx.doi.org/10.22214/ijraset.2024.62390.
Full textKashif Iqbal, Muhammad Khalid, Shamim Akhtar, Sajid Yasin, Noor Ahmed, and Aqsa Shahid. "Improving Spam Detection for German Users: A Machine Learning Approach to German Email Classification." Kashf Journal of Multidisciplinary Research 2, no. 06 (2025): 81–99. https://doi.org/10.71146/kjmr487.
Full textAlsudani, Saif, Hussein Nasrawi, Muntadher Shattawi, and Adel Ghazikhani. "Enhancing Spam Detection: A Crow-Optimized FFNN with LSTM for Email Security." Wasit Journal of Computer and Mathematics Science 3, no. 1 (2024): 28–39. http://dx.doi.org/10.31185/wjcms.199.
Full textFebriyani, Widia, Dhiya Fathia, Adityas Widjajarto, and Muharman Lubis. "Security Awareness Strategy for Phishing Email Scams: A Case Study One of a Company in Singapore." JOIV : International Journal on Informatics Visualization 7, no. 3 (2023): 808. http://dx.doi.org/10.30630/joiv.7.3.2081.
Full textAhmad, Sadique, Mohammed A.Elaffendi, Naveed Ahmad, and Ismail Shah. "Machine Learning-Enhanced Simulation of Multi-Vector Email Malware Spread in Organizational Networks." European Journal of Pure and Applied Mathematics 18, no. 3 (2025): 6542. https://doi.org/10.29020/nybg.ejpam.v18i3.6542.
Full textBoyinbode, Olutayo K., Oluwatoyin C. Agbonifo, and Aderonke Ogundare. "Supporting Mobile Learning with WhatsApp based on Media Richness." Circulation in Computer Science 2, no. 3 (2017): 37–46. http://dx.doi.org/10.22632/ccs-2017-251-89.
Full textDr., Paravathi C., G. Dhanyashree, R. Yeshaswini, and S. Lisha. "Unmasking the Evolution of Social Engineering in Cybersecurity: Techniques, Vulnerabilities, and Countermeasures." International Journal of Engineering and Management Research 14, no. 1 (2024): 65–70. https://doi.org/10.5281/zenodo.10686537.
Full textSOUSA, PEDRO, PAULO CORTEZ, RUI VAZ, MIGUEL ROCHA, and MIGUEL RIO. "EMAIL SPAM DETECTION: A SYMBIOTIC FEATURE SELECTION APPROACH FOSTERED BY EVOLUTIONARY COMPUTATION." International Journal of Information Technology & Decision Making 12, no. 04 (2013): 863–84. http://dx.doi.org/10.1142/s0219622013500326.
Full textTalekar, P. R. "A Study of Digital Marketing Opportunities & Challenges in India." International Journal of Advance and Applied Research 5, no. 23 (2024): 8–10. https://doi.org/10.5281/zenodo.13600571.
Full textBook chapters on the topic "Email Proliferation"
Blakey, Leah. "The Proliferation, Pitfalls, and Power of Online Education." In Web-Based Education. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-963-7.ch003.
Full textMarchewka, Jack T., Chang Liu, and Charles G. Petersen. "Issues and Perceptions of Unsolicited Commercial Electronic Mail." In The Social and Cognitive Impacts of e-Commerce on Modern Organizations. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-249-7.ch008.
Full textPratap, Ajay, and Gauri Giri. "Cybersecurity in the Age of Social Engineering." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. https://doi.org/10.4018/979-8-3693-6665-3.ch004.
Full textRao, Sanjeev, Anil Kumar Verma, and Tarunpreet Bhatia. "Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks." In Handbook of Research on Cyber Crime and Information Privacy. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5728-0.ch012.
Full textManju and Priyanshi Pandey. "IoT Based Home Security System." In IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815049480124060008.
Full textConference papers on the topic "Email Proliferation"
Lueg, Christopher. "Spam and Anti-Spam Measures: A Look at Potential Impacts." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2729.
Full textFukuda, Shuichi, Yoshifusa Matsuura, and Kigen Kandie. "Intelligent-Agent Approach to Distance Learning." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/eim-3715.
Full textChollet, Gérard, Hugues Sansen, Yannis Tevissen, et al. "Privacy Preserving Personal Assistant with On-Device Diarization and Spoken Dialogue System for Home and beyond." In Human Interaction and Emerging Technologies (IHIET-AI 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004577.
Full text