Professor, PhD, Director of EUROQUALROM - ETTI,
University “Politehnica” of Bucharest, Romania
President of the Romanian Association for Information Security Assurance (RAISA)
E-mail: ioan.bacivarov[at]upb[dot]ro
TOD-RĂILEANU, G.,BACIVAROV, I., (2023). An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime, 12(2), 23-26. Retrieve from http://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., 2023. An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime 12(2), 23-26. Available from: http://www.ijisc.comG. TOD-RĂILEANU, I. BACIVAROV, "An Overview on Artificial Intelligence Applied in Offensive Cybersecurity," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 23-26, 2023. Available: http://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., 'An Overview on Artificial Intelligence Applied in Offensive Cybersecurity', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 23-26, (2023).TOD-RĂILEANU, G.,BACIVAROV, I.,: An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime 12 (2023) 23-26. http://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., (2023), An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime, 12: 23-26. http://www.ijisc.com Citation Format :
DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I., (2022). Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime, 11(2), 29-34. Retrieve from http://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 2022. Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime 11(2), 29-34. Available from: http://www.ijisc.comA.M. DINCĂ, S.D. AXINTE, I. BACIVAROV, "Performance Enhancements for Database Transactions," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 29-34, 2022. Available: http://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 'Performance Enhancements for Database Transactions', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 29-34, (2022).DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I.,: Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime 11 (2022) 29-34. http://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., (2022), Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime, 11: 29-34. http://www.ijisc.com Citation Format :
BEST, M.,KRUMOV, L.,BACIVAROV, I., (2019). Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8(2), 39-52. Retrieve from http://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 2019. Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8(2), 39-52. Available from: http://www.ijisc.comM. BEST, L. KRUMOV, I. BACIVAROV, "Cyber Security in Banking Sector," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 39-52, 2019. Available: http://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 'Cyber Security in Banking Sector', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 39-52, (2019).BEST, M.,KRUMOV, L.,BACIVAROV, I.,: Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8 (2019) 39-52. http://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., (2019), Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8: 39-52. http://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2018). Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7(2), 9-13. Retrieve from http://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2018. Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7(2), 9-13. Available from: http://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Using Embedded Platforms to Monitor Network Security," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 9-13, 2018. Available: http://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Using Embedded Platforms to Monitor Network Security', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 9-13, (2018).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7 (2018) 9-13. http://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2018), Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7: 9-13. http://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from http://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: http://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: http://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. http://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. http://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from http://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: http://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: http://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. http://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. http://www.ijisc.com Citation Format :
BARBU, I.D.,BACIVAROV, I., (2014). Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3(2), 49-60. Retrieve from http://www.ijisc.comBARBU, I.D., BACIVAROV, I., 2014. Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3(2), 49-60. Available from: http://www.ijisc.comI.D. BARBU, I. BACIVAROV, "Heartbleed – The Vulnerability That Changed the Internet," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 49-60, 2014. Available: http://www.ijisc.comBARBU, I.D., BACIVAROV, I., 'Heartbleed – The Vulnerability That Changed the Internet', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 49-60, (2014).BARBU, I.D.,BACIVAROV, I.,: Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3 (2014) 49-60. http://www.ijisc.comBARBU, I.D., BACIVAROV, I., (2014), Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3: 49-60. http://www.ijisc.com Citation Format :
BACIVAROV, I. (2014). Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime, 3(1), 9-16. Retrieve from http://www.ijisc.comBACIVAROV, I., 2014. Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime 3(1), 9-16. Available from: http://www.ijisc.comI. BACIVAROV, "Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 9-16, 2014. Available: http://www.ijisc.comBACIVAROV, I., 'Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 9-16, (2014).BACIVAROV, I.: Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime 3 (2014) 9-16. http://www.ijisc.comBACIVAROV, I., (2014), Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime, 3: 9-16. http://www.ijisc.com Citation Format :
IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from http://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: http://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: http://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. http://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. http://www.ijisc.com Citation Format :
BACIVAROV, I.,MIHAI, I.C., (2012). Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1(1), 8-14. Retrieve from http://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 2012. Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1(1), 8-14. Available from: http://www.ijisc.comI. BACIVAROV, I.C. MIHAI, "Access Rights Analysis in Microsoft Windows and Linux Operating Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 8-14, 2012. Available: http://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 'Access Rights Analysis in Microsoft Windows and Linux Operating Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 8-14, (2012).BACIVAROV, I.,MIHAI, I.C.,: Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1 (2012) 8-14. http://www.ijisc.comBACIVAROV, I., MIHAI, I.C., (2012), Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1: 8-14. http://www.ijisc.com Citation Format :