360
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Email Security

      Published
      research-article
        1 ,
      ScienceOpen Posters
      ScienceOpen
      Bookmark

            Abstract

            Content

            Author and article information

            Journal
            ScienceOpen Posters
            ScienceOpen
            26 November 2020
            Affiliations
            [1 ] Karunya Institute of Technology and Sciences
            Author information
            https://orcid.org/0000-0001-7167-1248
            Article
            10.14293/S2199-1006.1.SOR-.PPBE0RF.v1
            788d471f-5caf-44b7-b683-a64acfc4190e

            This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

            History
            : 26 November 2020

            The data that support the findings of this study are available from https://phoenixnap.com/blog/email-security-best-practices but restrictions apply to the availability of these data, which were used under license for the current study, and so are not publicly available. Data are however available from the authors upon reasonable request and with permission of https://phoenixnap.com/blog/email-security-best-practices.
            Computer science

            Comments

            Comment on this article