AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A., (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8(2), 9-20. Retrieve from http://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 2019. Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8(2), 9-20. Available from: http://www.ijisc.comA. AJIBOLA, I. UJATA, O. ADELAIYE, N.A. RAHMAN, "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 9-20, 2019. Available: http://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 'Mitigating Advanced Persistent Threats: A Comparative Evaluation Review', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 9-20, (2019).AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A.,: Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8 (2019) 9-20. http://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., (2019), Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8: 9-20. http://www.ijisc.com Citation Format :
PETRICĂ, G. (2019). A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8(2), 21-26. Retrieve from http://www.ijisc.comPETRICĂ, G., 2019. A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8(2), 21-26. Available from: http://www.ijisc.comG. PETRICĂ, "A Study on Password Strength in Wireless Encryption Protocols," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 21-26, 2019. Available: http://www.ijisc.comPETRICĂ, G., 'A Study on Password Strength in Wireless Encryption Protocols', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 21-26, (2019).PETRICĂ, G.: A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8 (2019) 21-26. http://www.ijisc.comPETRICĂ, G., (2019), A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8: 21-26. http://www.ijisc.com Citation Format :
BELSHAW, S.H. (2019). Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime, 8(2), 27-38. Retrieve from http://www.ijisc.comBELSHAW, S.H., 2019. Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime 8(2), 27-38. Available from: http://www.ijisc.comS.H. BELSHAW, "Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 27-38, 2019. Available: http://www.ijisc.comBELSHAW, S.H., 'Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 27-38, (2019).BELSHAW, S.H.: Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime 8 (2019) 27-38. http://www.ijisc.comBELSHAW, S.H., (2019), Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime, 8: 27-38. http://www.ijisc.com Citation Format :
BEST, M.,KRUMOV, L.,BACIVAROV, I., (2019). Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8(2), 39-52. Retrieve from http://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 2019. Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8(2), 39-52. Available from: http://www.ijisc.comM. BEST, L. KRUMOV, I. BACIVAROV, "Cyber Security in Banking Sector," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 39-52, 2019. Available: http://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 'Cyber Security in Banking Sector', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 39-52, (2019).BEST, M.,KRUMOV, L.,BACIVAROV, I.,: Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8 (2019) 39-52. http://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., (2019), Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8: 39-52. http://www.ijisc.com Citation Format :
STAMATAKIS, N.,SMITH, T., (2019). Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime, 8(2), 53-88. Retrieve from http://www.ijisc.comSTAMATAKIS, N., SMITH, T., 2019. Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime 8(2), 53-88. Available from: http://www.ijisc.comN. STAMATAKIS, T. SMITH, "Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 53-88, 2019. Available: http://www.ijisc.comSTAMATAKIS, N., SMITH, T., 'Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 53-88, (2019).STAMATAKIS, N.,SMITH, T.,: Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime 8 (2019) 53-88. http://www.ijisc.comSTAMATAKIS, N., SMITH, T., (2019), Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime, 8: 53-88. http://www.ijisc.com Citation Format :
MIHAI, I.C.,ZETU, C., (2019). Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8(2), 89-96. Retrieve from http://www.ijisc.comMIHAI, I.C., ZETU, C., 2019. Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8(2), 89-96. Available from: http://www.ijisc.comI.C. MIHAI, C. ZETU, "Romanian Law Enforcement Involvement in Fighting Cyber Crime," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 89-96, 2019. Available: http://www.ijisc.comMIHAI, I.C., ZETU, C., 'Romanian Law Enforcement Involvement in Fighting Cyber Crime', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 89-96, (2019).MIHAI, I.C.,ZETU, C.,: Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8 (2019) 89-96. http://www.ijisc.comMIHAI, I.C., ZETU, C., (2019), Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8: 89-96. http://www.ijisc.com Citation Format :