SDN based security solution for legislative email communications: Safe guarding communication
Communication plays a major role in the day to day activities of the world. Communication can be a gesture, phone call or by e-mail. This why most of the governments pay more attention to communication patterns and what people communicate with each other. In modern day information technology plays a...
| Main Authors: | Rupasinghe, P., Kulatunga, K., Murray, Iain, Keseva, K. |
|---|---|
| Format: | Conference Paper |
| Published: |
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/59575 |
Similar Items
Secured Real-Time Machine Communication Protocol
by: Ren, yifei, et al.
Published: (2024)
by: Ren, yifei, et al.
Published: (2024)
Trust framework for handling communication using social networks as applied to mobile sensor based indoor navigation system
by: Rupasinghe, L., et al.
Published: (2014)
by: Rupasinghe, L., et al.
Published: (2014)
Notes on al-Biruni’s view on safe-guarding the soul
by: Abdul Latif Samian,
Published: (2003)
by: Abdul Latif Samian,
Published: (2003)
Security guard monitoring system
by: Lee, Jie Lun
Published: (2024)
by: Lee, Jie Lun
Published: (2024)
The reformed usage of email communication within an ODL-university
by: Wagner, Karl
Published: (2005)
by: Wagner, Karl
Published: (2005)
User motive factors: the rudiments to email satisfactory communication
by: Anumudu, Chinedu Eugenia, et al.
Published: (2021)
by: Anumudu, Chinedu Eugenia, et al.
Published: (2021)
Predicting the effects of demographic factors on email satisfactory communication
by: Anumudu, Chinedu Eugenia, et al.
Published: (2020)
by: Anumudu, Chinedu Eugenia, et al.
Published: (2020)
User motive factors: the rudiments to email satisfactory communication
by: Anumudu, Chinedu Eugenia, et al.
Published: (2021)
by: Anumudu, Chinedu Eugenia, et al.
Published: (2021)
Workplace communication technology focusing on implementing accurate language in emails
by: Nazifah Hamidun,, et al.
Published: (2017)
by: Nazifah Hamidun,, et al.
Published: (2017)
Implementation of secure email server in cloud environment
by: Madi, Nadim K. M., et al.
Published: (2012)
by: Madi, Nadim K. M., et al.
Published: (2012)
Predicting the diffusion pattern of internet-based communication applications using bass model parameter estimates for email
by: Wong, David, et al.
Published: (2011)
by: Wong, David, et al.
Published: (2011)
Superior – subordinate request email in workplace communication of a Malaysian organisation
by: Paramasivam, Shamala, et al.
Published: (2018)
by: Paramasivam, Shamala, et al.
Published: (2018)
Impact of immediacy and user motive on communication satisfaction in email communication among academic staff in South East Nigeria
by: Eugenia, Anumudu Chinedu
Published: (2019)
by: Eugenia, Anumudu Chinedu
Published: (2019)
UNIMAS security guards being trained as auxiliary cops
by: The Borneo Post
Published: (2016)
by: The Borneo Post
Published: (2016)
Request strategies in email communication in a private institution / Marchie Lim Pin Sim
by: Lim, Marchie Pin Sim
Published: (2012)
by: Lim, Marchie Pin Sim
Published: (2012)
Virtual guard
by: Mohamad Faiz, Mohd Ali
Published: (2010)
by: Mohamad Faiz, Mohd Ali
Published: (2010)
Submission 35 to The Senate Environment, Communications and the Arts Legislation Committee
by: Fullarton, Lex
Published: (2010)
by: Fullarton, Lex
Published: (2010)
Effect of guard band on the performance of AP-DCDM technique in 40 Gb/s optical fiber communication system
by: Malekmohammadi, Amin, et al.
Published: (2010)
by: Malekmohammadi, Amin, et al.
Published: (2010)
Immediacy factors as solutions to email satisfactory communication among South-East Nigerian academic staff: structural equation modeling and preliminary findings
by: Anumudu, Chinedu Eugenia, et al.
Published: (2020)
by: Anumudu, Chinedu Eugenia, et al.
Published: (2020)
Immediacy factors as solutions to email satisfactory communication among South-East Nigerian academic staff: structural equation modeling and preliminary findings
by: Anumudu, Chinedu Eugenia, et al.
Published: (2020)
by: Anumudu, Chinedu Eugenia, et al.
Published: (2020)
Email spam filtering technique: challenges and solutions
by: Md Yasin, Sharifah, et al.
Published: (2023)
by: Md Yasin, Sharifah, et al.
Published: (2023)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
The contribution of email volume, email management strategies and propensity to worry in predicting email stress among academics
by: Jerejian, Ailsa, et al.
Published: (2013)
by: Jerejian, Ailsa, et al.
Published: (2013)
Intelligent shoe guard system
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Water is life, guard it well
by: Abd Razak, Dzulkifli
Published: (2008)
by: Abd Razak, Dzulkifli
Published: (2008)
Automatic home guarding system
by: Lim, Kheng Hee, et al.
Published: (2016)
by: Lim, Kheng Hee, et al.
Published: (2016)
Don’t drop your guard
by: Tang, Ashley
Published: (2021)
by: Tang, Ashley
Published: (2021)
Email is evil! Behavioural responses towards permission-based direct email marketing and gender differences
by: Mahmoud, A. B., et al.
Published: (2019)
by: Mahmoud, A. B., et al.
Published: (2019)
The cardiorespiratory fitness, level of physical activity and cardiovascular risk factors among university security guards
by: Cheah, W.L, et al.
Published: (2015)
by: Cheah, W.L, et al.
Published: (2015)
Computer Communication Networks Security Analysis
by: Gumel, Lawan Ahmed
Published: (1999)
by: Gumel, Lawan Ahmed
Published: (1999)
A new elliptic curve cryptographic system over the finite fields
by: Priyatharsan, U., et al.
Published: (2017)
by: Priyatharsan, U., et al.
Published: (2017)
Trustworthy provenance framework for document workflow provenance
by: Rupasinghe, P., et al.
Published: (2016)
by: Rupasinghe, P., et al.
Published: (2016)
Trust-based mechanisms for secure communication in cognitive radio networks
by: Parvin, Sazia
Published: (2013)
by: Parvin, Sazia
Published: (2013)
Secure Wireless Communications Based on Compressive Sensing: A Survey
by: Zhang, Y., et al.
Published: (2018)
by: Zhang, Y., et al.
Published: (2018)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
An investigation into dynamic TLPs for smartphone communication: To facilitate timed response in way finding for vision impaired people
by: De Silva, D., et al.
Published: (2013)
by: De Silva, D., et al.
Published: (2013)
Pak guard bangga genggam segulung ijazah
by: Utusan Malaysia
Published: (2017)
by: Utusan Malaysia
Published: (2017)
Student lodges report against UPM guards
by: The Sun, Kong See Hoh
Published: (2007)
by: The Sun, Kong See Hoh
Published: (2007)
Similar Items
-
Secured Real-Time Machine Communication Protocol
by: Ren, yifei, et al.
Published: (2024) -
Trust framework for handling communication using social networks as applied to mobile sensor based indoor navigation system
by: Rupasinghe, L., et al.
Published: (2014) -
Notes on al-Biruni’s view on safe-guarding the soul
by: Abdul Latif Samian,
Published: (2003) -
Security guard monitoring system
by: Lee, Jie Lun
Published: (2024) -
The reformed usage of email communication within an ODL-university
by: Wagner, Karl
Published: (2005)