ILIE, R.C. (2013). Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2(1), 9-16. Retrieve from http://www.ijisc.comILIE, R.C., 2013. Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2(1), 9-16. Available from: http://www.ijisc.comR.C. ILIE, "Online Transactions Security in Internet Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 9-16, 2013. Available: http://www.ijisc.comILIE, R.C., 'Online Transactions Security in Internet Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 9-16, (2013).ILIE, R.C.: Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2 (2013) 9-16. http://www.ijisc.comILIE, R.C., (2013), Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2: 9-16. http://www.ijisc.com Citation Format :
SEREȚEANU, A. (2013). Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2(1), 17-24. Retrieve from http://www.ijisc.comSEREȚEANU, A., 2013. Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2(1), 17-24. Available from: http://www.ijisc.comA. SEREȚEANU, "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 17-24, 2013. Available: http://www.ijisc.comSEREȚEANU, A., 'Security in Most Recent Generation of Mobile Telecommunication Networks – LTE', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 17-24, (2013).SEREȚEANU, A.: Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2 (2013) 17-24. http://www.ijisc.comSEREȚEANU, A., (2013), Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2: 17-24. http://www.ijisc.com Citation Format :
GRIGORAȘ, A. (2013). The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2(1), 25-34. Retrieve from http://www.ijisc.comGRIGORAȘ, A., 2013. The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2(1), 25-34. Available from: http://www.ijisc.comA. GRIGORAȘ, "The Security of Cloud Networks," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 25-34, 2013. Available: http://www.ijisc.comGRIGORAȘ, A., 'The Security of Cloud Networks', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 25-34, (2013).GRIGORAȘ, A.: The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2 (2013) 25-34. http://www.ijisc.comGRIGORAȘ, A., (2013), The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2: 25-34. http://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2(1), 35-42. Retrieve from http://www.ijisc.comMIHAI, I.C., 2013. Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2(1), 35-42. Available from: http://www.ijisc.comI.C. MIHAI, "Comparative Study between Traditional Security and Survivability," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 35-42, 2013. Available: http://www.ijisc.comMIHAI, I.C., 'Comparative Study between Traditional Security and Survivability', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 35-42, (2013).MIHAI, I.C.: Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2 (2013) 35-42. http://www.ijisc.comMIHAI, I.C., (2013), Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2: 35-42. http://www.ijisc.com Citation Format :
CONSTANTIN, A. (2013). Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2(1), 43-48. Retrieve from http://www.ijisc.comCONSTANTIN, A., 2013. Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2(1), 43-48. Available from: http://www.ijisc.comA. CONSTANTIN, "Cybercrime and National Security in the Context of Globalization," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 43-48, 2013. Available: http://www.ijisc.comCONSTANTIN, A., 'Cybercrime and National Security in the Context of Globalization', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 43-48, (2013).CONSTANTIN, A.: Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2 (2013) 43-48. http://www.ijisc.comCONSTANTIN, A., (2013), Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2: 43-48. http://www.ijisc.com Citation Format :
MARCEL, I. (2013). The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime, 2(1), 49-58. Retrieve from http://www.ijisc.comMARCEL, I., 2013. The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime 2(1), 49-58. Available from: http://www.ijisc.comI. MARCEL, "The Components of Cyber-Terrorism," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 49-58, 2013. Available: http://www.ijisc.comMARCEL, I., 'The Components of Cyber-Terrorism', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 49-58, (2013).MARCEL, I.: The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime 2 (2013) 49-58. http://www.ijisc.comMARCEL, I., (2013), The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime, 2: 49-58. http://www.ijisc.com Citation Format :
PARODI, F. (2013). The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2(1), 59-66. Retrieve from http://www.ijisc.comPARODI, F., 2013. The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2(1), 59-66. Available from: http://www.ijisc.comF. PARODI, "The Concept of Cybercrime and Online Threats Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 59-66, 2013. Available: http://www.ijisc.comPARODI, F., 'The Concept of Cybercrime and Online Threats Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 59-66, (2013).PARODI, F.: The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2 (2013) 59-66. http://www.ijisc.comPARODI, F., (2013), The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2: 59-66. http://www.ijisc.com Citation Format :