Limpar
108 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Jornais Acesso aberto

David Dale, Waldemar Januszczak, John Dugdale, Barbara Hall, Chris Stephen, Nigel Botherway, Lucas Hollweg, Christopher Morgan Religious Affairs Correspondent, Donald MacGillivray, Steve McQueen, Charles Masters, Philip Norman, John Peter, George Georgiou, Walter F Stowy, Amanda Ursell, Nick Bradshaw, Jonathan Miller, Angela Tuhey, Lesley White, Lawrie Madden, John Jay, Susan d'Arcy, Mascha von Prittwitz, Emine Saner, Jone Ashbourne, Peter Matonis, Fortunino Matania, David Landers, Sharon Smith, Dr Joseph Kearns, Kirstle Hamilton, Addison de Witt, Sally Payne, Lucy Hughes-Hallett, David Smith, Kirstie Hamilton City Editor, Nick Pitt, Neil Wormald, Magic roundabout, Andrew Sullivan, Stephen Grey, Mary Wilson, Dr Roger Henderson, Andrew Grice Political Editor, John Lawless, Tony Allen-Mills, Martin James, Robert Sandall, Anthony Sattin, Susan d'ARCY, Irwin Stelzer, Robert Hewison, Peter Wilson, Roger Anderson, Charlotte Wolff, David Dougill, Martin Bradley, Barbara Page, John Gribbin, D D, Philip Kingsley, Reverend Andrew de Berry, David Hewson, Gareth Daniels, Harvey Porlock, Yvonne Ridley, Hugh Canning, Liam Burton, Jeremy Clarkson, John Sutherland, Edward Porter, Stewart Lee, Louise Taylor, S N E, Anita Chaudhuri, Peter Millar, Peter Hadfield, George Perry, Kevin Connolly, Graham Otway, Hugh McManners Defence Correspondent, Anselm Kuhn, Nick Gardner, Shelley von Strunckel, Jean Healy, Paul Ham, Stuart Wavell, Alan Wall, Michael Travis, Paul Donovan, Sue Lawrence, Philip Craigie, Hugh McIlvanney, Hugh Cecil, Paul Driver, Derek Clements, Michael Woodhead, Simon Fanshawe, Ann McFerran, Ian Hawkey, Ian Chadband, Peter Brook's, Brian Jackman, Mr C., Neil Harman, Kirstie Hamilton, Anthony Storr, Tom Shone, Rufus Olins, Mark Edwards, Stephen Amidon, Mark Austin, Chris Smith, David Lawrenson, Paul Ham Money Editor, Amir Shivji, Adrian Brodkin, Edward Plan, Tony Sadler Archbishops' Secretary for Appointments, Andy Goldberg, Phil Baker, John Harlow Arts Correspondent, Lois Rogers, Anna Pasternak, Anthea Turner, Raymond Keene, Paul Bew, D G F, Zoe Brennan, Andrew Roberts, Marie Colvin, Debbie Hill, Mark Seddon, Chris Partridge, Tony Peisley, Stephen Jones, Rebecca Tanqueray, Edwina Currie, Adrienne Connors, Steve Malins, Natalie Graham, Andrew Smith, Paul Nuki, Andrew Grice, Philip Camberg, Hugh McManners, Steve Connor Science Correspondent, Martin Searby, Rob Ryan, Claire Oldfield, Miranda Seymour, Zoë Linkson, Mark MacAskill, Rasselas, Trevor Lewis, Lois Rogers Medical Correspondent, A H Gaskell, Christopher Goodwin, Peter Taylor, Naoml Caine, Paul Kavanagh, Norman Stone, Garth Alexander, George Austin, Neil Ostrom, William Rees-Mogg, Marcello Mega, Alex Fortune, Kevin Pratt, Pauline Melvill, Mark Franchetti, Ray Hutton, Jon Ungoed-Thomas, Rufus Olins Deputy City Editor, Peter Watts, Kevin McCarra, Jonathan Leake, Tara Palmer-Tomkinson, George Nairn-Briggs, Rduben Fonseca, P C, Michael Sheridan, Ian Edwards, Sharon Davey, Frank Whltford, Matthew Lynn, Thomas Pynchon, Michael Hodges, Andrew Alderson, Andrew Malone, Matthew Campbell, Richard E Grant, H Roberts, David Hutcheon, Rajeev Syal, S J Taylor, Lake Sagaris, Robert Johnston, Stephen Pettitt, Chrissy Iley, Peter, Cherry Norton, John Spurling, Lisa Verrico, Jeremy Langmead, John Kerry, Naomi Caine, Liam Clarke, David Wickers, Tim Parker, Donald Watts, David Hargreaves, Roger Dobson, Rex Thompson, John Cornwell, Mark Hodson, Joe Lovejoy, Martin Donovan, Rupert Steiner, Michael Harris, Chris Lightbown, Ali Stewart, T Mitchell, David Parsley, T H, Emily Webber, David Smith Economics Editor, Peter Cooper, J A Holland, Carey Scott, Stephen Boyd, Joe West, India Knight, H Roach, Dan Pearson, Nigel Glass, Joan Smith, Boris Schapiro, Julian Pettifer, Dame Muriel Spark,

... Electric engine boosts racing car at Le Mans Webmail's high hopes go up in smoke at the Net cafe Webmail is a system that lets you pick up ...

1998 - Gale Group | Sunday Times HA GDA

Artigo Revisado por pares

Yehonatan Cohen, Danny Hendler, Amir Rubin,

... first comprehensive study of the properties of malicious webmail attachments. We show that they are distinct among ... type and family. Furthermore, we show that malicious webmail attachments are unique in the manner in which ... detector that provides high-quality detection of malicious webmail attachments.

Tópico(s): Internet Traffic Analysis and Secure E-voting

2017 - Elsevier BV | Knowledge-Based Systems

Artigo Acesso aberto Revisado por pares

Marcelo G. Armentano, Analı́a Amandi,

... article, we present an approach to enhance a webmail client with an interface agent that helps the ... performed a set of experiments using Google's webmail system, Gmail, obtaining a good rate of acceptance ...

Tópico(s): Personal Information Management and User Behavior

2014 - Elsevier BV | Knowledge-Based Systems

Artigo Revisado por pares

Kyoo Lee,

... reality, “in front of you” and me <https://webmail.psu.edu/webmail/blank.html#_edn1. Such is the broad philosophical ...

Tópico(s): Critical Race Theory in Education

2013 - Penn State University Press | Critical Philosophy of Race

Artigo Revisado por pares

Vladimir Kolesnikov, Abdullatif Shikfa,

... on a typical application of OPE, encrypted searchable webmail service. We describe how the use of OPE ... of interactions that should be allowed with a webmail server. © 2012 Alcatel-Lucent.

Tópico(s): Complexity and Algorithms in Graphs

2012 - Wiley | Bell Labs Technical Journal

Artigo Revisado por pares

Anthony Cruz, Eunice Ramírez, Alberto Santana, Gabriel Barletta, Gustavo E. López,

... edu 2. asantana@uprm.edu 3. gl_barletta@webmail.uprh.edu 4. glopez@uprm.edu Additional informationNotes ... uprm.edu Gabriel Barletta 3. 3. gl_barletta@webmail.uprh.edu Gustavo E. López 4. 4. glopez@ ...

Tópico(s): Protein Interaction Studies and Fluorescence Analysis

2008 - Taylor & Francis | Molecular Simulation

Artigo Acesso aberto

Marc A Sherman,

... email, it is not yet defined as to webmail. That is - this paper shows that relevant statutes ...

Tópico(s): Privacy, Security, and Data Protection

2007 - RELX Group (Netherlands) | SSRN Electronic Journal

Artigo Revisado por pares

Ruixuan Li, Zhenyong Zhang, Jun Shao, Rongxing Lu, Xiaoqi Jia, Guiyi Wei,

Webmail, protected by the HTTPS protocol, only works correctly if both the server and client implement HTTPS- ... the deployment situation of these features in the webmail world is still unclear. To this end, we ... end-to-end and large-scale measurement of webmail service. For the server side, we first build ... of 2.2 billion. Then we construct two webmail domain datasets: one contains 21 k domains filtered ... After performing a comprehensive measurement on these two webmail domain datasets, we find that some features are ...

Tópico(s): IPv6, Mobility, Handover, Networks, Security

2023 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing

Artigo Revisado por pares

Magdalena Wojcieszak, Ericka Menchen-Trevino, João Gonçalves, Brian E. Weeks,

... networks, (3) news aggregators, (4) search engines, (5) webmail, and (6) hyperlinks in news. We examine the ...

Tópico(s): Media Studies and Communication

2021 - SAGE Publishing | The International Journal of Press/Politics

Artigo Acesso aberto Revisado por pares

Miguel Ángel De la Cámara, Augusto Jiménez de la Fuente, Ana I. Pardos‐Sevilla,

... by convenience through several social media and university webmail and it was encouraged to pass on to ...

Tópico(s): COVID-19 and Mental Health

2020 - Wiley | Translational Sports Medicine

Artigo Acesso aberto Revisado por pares

Andrew M. Guess, Brendan Nyhan, Zachary O’Keeffe, Jason Reifler,

... vaccine-skeptical webpages is associated with usage of webmail and, to a lesser extent, Facebook. Online exposure ...

Tópico(s): Hate Speech and Cyberbullying Detection

2020 - Elsevier BV | Vaccine

Artigo Acesso aberto Revisado por pares

Yong Fang, Yijia Xu, Peng Jia, Cheng Huang,

With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make emails a good target for hackers. One of the most common attack method used by hackers is email XSS (Cross-site scripting). Through exploiting XSS vulnerabilities, hackers can steal identities, logging into the victim’s mailbox and stealing content directly. ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo Acesso aberto Revisado por pares

Scott Ruoti, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'Neill, Ken Reese, Brad Spendlove, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent Seamons,

... 28 pairs of novices as they use Private WebMail (Pwm), Tutanota, and Virtru and 10 pairs of ...

Tópico(s): Personal Information Management and User Behavior

2019 - Association for Computing Machinery | ACM Transactions on Privacy and Security

Artigo Revisado por pares

Barış Coşkun,

... captured at the login servers of a large webmail provider with hundreds of millions of active users.

Tópico(s): Complex Network Analysis Techniques

2017 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Artigo Revisado por pares

Simone Sarti, Moris Triventi,

... well. We analyse data from an ad hoc webmail survey conducted on about 2000 undergraduate students enrolled ...

Tópico(s): Sports Analytics and Performance

2016 - Elsevier BV | Social Science Research

Artigo Acesso aberto Revisado por pares

Haider Al‐Khateeb, Gregory Epiphaniou, Zhraa A. Alhaboby, James Barnes, Emma Short,

... large, cross-border international companies providing mobile services, webmail and social networking. The lack of support offered ...

Tópico(s): Cybercrime and Law Enforcement Studies

2016 - Elsevier BV | Telematics and Informatics

Artigo Revisado por pares

Chun‐I Fan, Shiyuan Huang,

... computing such as remote untrusted storages and encrypted webmail search. Biometric matching could also be constructed by ...

Tópico(s): Chaos-based Image/Signal Encryption

2014 - Taiwan Academic Network | 網際網路技術學刊

Artigo Acesso aberto Revisado por pares

Josefina Carlorosi, Susana Heredia, Guillermo F. Aceñolaza,

... 205, (4000) Tucumán, Argentina; Guillermo F. Aceñolaza [acecha@webmail.unt.edu.ar], Universidad Nacional de Tucumán—CONICET, ...

Tópico(s): Marine Biology and Ecology Research

2013 - Taylor & Francis | Alcheringa An Australasian Journal of Palaeontology

Artigo Acesso aberto Revisado por pares

Peter Swire,

... and voice communications, via virtual private networks, encrypted webmail, SSL web sessions, and encrypted Voice over IP ...

Tópico(s): Privacy-Preserving Technologies in Data

2012 - Oxford University Press | International Data Privacy Law

Artigo Revisado por pares

Angela Lin, Nan-Chou Chen,

... reached $8.1bn. While cloud services such as webmail, Flickr and YouTube have been widely used by ...

Tópico(s): IoT and Edge/Fog Computing

2012 - Elsevier BV | International Journal of Information Management

Artigo Acesso aberto Revisado por pares

Ian Brown,

... store records relating to their customers' communications on webmail, social media, and other sites, which could then ...

Tópico(s): Cybercrime and Law Enforcement Studies

2012 - Oxford University Press | International Data Privacy Law

Artigo Acesso aberto Revisado por pares

Fernando Lolas Stepke, Eduardo Rodrı́guez,

... activities, with further support for maintaining contact via webmail and personal meetings. The network formed by faculty ...

Tópico(s): Ethics in Clinical Research

2012 - University of Chile | Acta bioethica

Artigo Revisado por pares

Y. Ken Wang, Pratim Datta,

... empirical evidence from IS continuance intentions related to Webmail services, findings from the study offer interesting insights ...

Tópico(s): Digital Platforms and Economics

2009 - IGI Global | Information Resources Management Journal

Artigo

Sonja Utz,

... more than one E-mail address. Especially free webmail addresses (freemail) are extremely popular. People used more ...

Tópico(s): Impact of Technology on Adolescents

2004 - Mary Ann Liebert, Inc. | CyberPsychology & Behavior

Artigo Revisado por pares

Kyoo Lee,

... in front of you” and me &lt;https://webmail.psu.edu/webmail/blank.html#_edn1&gt;. Such is the broad ...

Tópico(s): Historical Gender and Feminism Studies

2013 - Penn State University Press | Critical Philosophy of Race

Capítulo de livro Acesso aberto Revisado por pares

Carlos Gacimartín, José Alberto Hernández, David Larrabeiti,

... with a focus on social interaction services like webmail. The elderly feel very confident with their TVs ...

Tópico(s): Multimedia Communication and Technology

2011 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Baris Yilmazsoy, Mohammed Saad, Svetlana Cicmil,

... This was followed by a second survey on webmail services. Exploratory factor analysis revealed the dimensionality of ...

Tópico(s): Digital Marketing and Social Media

2009 - Taylor & Francis | Service Industries Journal

Artigo Acesso aberto

T. Manesh, Adnan Abdalla, Mohemmed Sha, Mohamed Mustaq, Mohamed Yacoab, V K Bhadran, Abraham Varghese,

... research work revels working background of SSL based webmail forensic engine, which decrypt respective communication or network ... and also reconstruct the actual message contents of webmail applications. This digital forensic engine is compatible to ... and enables forensic reconstruction followed by analysis of webmail clients. Proposed forensic engine employs is a high- ...

Tópico(s): Digital and Cyber Forensics

2017 - Science and Information Organization | International Journal of Advanced Computer Science and Applications

Artigo Acesso aberto Revisado por pares

Xin Wang, Runpu Wu, Jinxin Ma, Gang Long, Jedeng Han,

... detection. By applying the tool to some popular Webmail systems, seven exploitable XSS vulnerabilities are found. The ...

Tópico(s): Spam and Phishing Detection

2018 - Elsevier BV | Procedia Computer Science