•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
Search 
  •   FUM Digital Library
  • Search
  •   FUM Digital Library
  • Search
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 51

    • Relevance
    • Title Asc
    • Title Desc
    • Year Asc
    • Year Desc
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
  • Export
    • CSV
    • RIS
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Phishing Our Employees 

    Type: Journal Paper
    Author : Epstein, Jeremy
    Publisher: IEEE
    Year: 2014

    مروری بر روش های حمله فیشینگ و مقابله با آن ها 

    Type: Conference Paper
    Author : سلمان, کمالی زاده; غلامرضا, شاه محمدی; حسام الدین, کمال زاده تختی
    Request PDF

    مروری بر روش های حمله فیشینگ و مقابله با آن ها 

    Type: Conference Paper
    Author : سلمان, کمالی زاده; غلامرضا, شاه محمدی; حسام الدین, کمال زاده تختی
    Request PDF

    Various mining techniques defined for mining product valuation instances in market basket data 

    Type: Conference Paper
    Author : Chavan, G.; Samal, T.; Palivela, H.; Gaikwad, N.; Sonule, A.
    Publisher: IEEE
    Year: 2014

    Academic Information Security Researchers: Hackers or Specialists? 

    Type: Journal Paper
    Author : مهدی دادخواه; محمد لگزیان; Glenn Borchardt; Mehdi Dadkhah; Mohammad Lagzian
    Year: 2017
    Abstract:

    In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings ...

    Leveraging health through the enhancement of information access using Mobile and service oriented technology 

    Type: Conference Paper
    Author : Namuye, S. , Mutanu, L. , Chege, G. , Macharia, J.
    Publisher: IEEE
    Year: 2014

    Capacity analysis of finite scatterer MIMO wireless channels 

    Type: Conference Paper
    Author : Shangbin Wu , Cheng-Xiang Wang , Bo Ai , Yejun He
    Publisher: IEEE
    Year: 2014

    Low-power duty-cycle tuned filters 

    Type: Conference Paper
    Author : Meng, Xin , Temes, Gabor C.
    Publisher: IEEE
    Year: 2014

    Committee 

    Type: Conference Paper
    Publisher: IEEE
    Year: 2014

    Going Spear Phishing: Exploring Embedded Training and Awareness 

    Type: Journal Paper
    Author : Caputo, Deanna D.; Pfleeger, Shari Lawrence; Freeman, Joshua D.; Johnson, M. Eric
    Publisher: IEEE
    Year: 2014
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 6

    Author

    ... View More

    Publisher

    Year

    Keywords

    ... View More

    Type

    Language (ISO)

    Content Type

    Publication Title

    ... View More
    • About Us
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    DSpace software copyright © 2019-2022  DuraSpace