OANCEA, C.V. (2015). Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4(1), 59-62. Retrieve from https://www.ijisc.comOANCEA, C.V., 2015. Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4(1), 59-62. Available from: https://www.ijisc.comC.V. OANCEA, "Artificial Intelligence Role in Cybersecurity Infrastructures," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 59-62, 2015. Available: https://www.ijisc.comOANCEA, C.V., 'Artificial Intelligence Role in Cybersecurity Infrastructures', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 59-62, (2015).OANCEA, C.V.: Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4 (2015) 59-62. https://www.ijisc.comOANCEA, C.V., (2015), Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4: 59-62. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2014). Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3(2), 43-48. Retrieve from https://www.ijisc.comOANCEA, C.V., 2014. Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3(2), 43-48. Available from: https://www.ijisc.comC.V. OANCEA, "Cybersecurity in Cloud Computing Context," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 43-48, 2014. Available: https://www.ijisc.comOANCEA, C.V., 'Cybersecurity in Cloud Computing Context', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 43-48, (2014).OANCEA, C.V.: Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3 (2014) 43-48. https://www.ijisc.comOANCEA, C.V., (2014), Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3: 43-48. https://www.ijisc.com Citation Format :