{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:03:01Z","timestamp":1730235781751,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995983","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Development of an Email System using Java and comparison with other Email Applications"],"prefix":"10.1109","author":[{"given":"Sunny","family":"Kumar","sequence":"first","affiliation":[{"name":"Chandigarh University,Department of Computer science,Gharaun,Punjab,India"}]},{"given":"Sonali","family":"Dash","sequence":"additional","affiliation":[{"name":"Saveetha School of Engineering,Department of Computer science,Gharaun,Punjab,India"}]},{"given":"Lakshmipriya","family":"Vinjamuri","sequence":"additional","affiliation":[{"name":"Uttaranchal University,Dehradun,India,248007"}]},{"family":"Kavita","sequence":"additional","affiliation":[{"name":"SGT University,Faculty of Computer Science and Engineering,Gurugram,India,122505"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCOINS.2018.8510588"},{"key":"ref2","article-title":"A systematic literature review of machine learning estimation approaches in scrum projects","volume-title":"Cognitive Informatics and Soft Computing. Advances in Intelligent Systems and Computing","volume":"1040","author":"M","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/RTTAS.2002.1137384"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s21144749"},{"journal-title":"in Software Engineering Research: A Systematic Literature Review Hatice Koc","year":"2021","author":"Diagrams","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946862"},{"key":"ref7","article-title":"Disposition of Youth in Predicting Sustainable Development Goals Using the Neuro-fuzzy and Random Forest Algorithms","volume-title":"HCIS","author":"Gaur","year":"2021"},{"issue":"4","key":"ref8","first-page":"55","article-title":"Smart secure and energy efficient scheme for e-health applications using iot: a review","volume":"20","author":"Humayun","year":"2020","journal-title":"International Journal of Computer Science and Network Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCISci.2019.8716471"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5121\/ijsea.2016.7304"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2021.101211"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-1851-9.ch007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3098011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3421510"},{"journal-title":"in a Corporate Wireless Local-Area NetworkMagdalena Balazinska MIT Laboratory for Computer Science mbalazin@lcs.mit.edu","author":"Mobility","key":"ref15"},{"key":"ref16","first-page":"878","article-title":"Simple Mail Transfer Protocol (smtp)","volume-title":"Wiley, JanuaryIn book: Handbook of Information Security","year":"2006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2019.8240"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76346-6_15"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995983.pdf?arnumber=9995983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:23:21Z","timestamp":1709378601000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995983\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995983","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}