National University of Science and Technology POLITEHNICA Bucharest, Faculty of Electronics, Telecommunications and Information Technology, Romania
E-mail: gabriel.petrica[at]upb[dot]ro
ARGHIRESCU, S.A.,PETRICĂ, G., (2024). Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime, 13(2), 46-51. Retrieve from https://www.ijisc.comARGHIRESCU, S.A., PETRICĂ, G., 2024. Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime 13(2), 46-51. Available from: https://www.ijisc.comS.A. ARGHIRESCU, G. PETRICĂ, "Securing Multimedia Content Using Digital Rights Management," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 46-51, 2024. Available: https://www.ijisc.comARGHIRESCU, S.A., PETRICĂ, G., 'Securing Multimedia Content Using Digital Rights Management', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 46-51, (2024).ARGHIRESCU, S.A.,PETRICĂ, G.,: Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime 13 (2024) 46-51. https://www.ijisc.comARGHIRESCU, S.A., PETRICĂ, G., (2024), Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime, 13: 46-51. https://www.ijisc.com Citation Format :
PETRICĂ, G.,MIHAI, I.C., (2020). Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime, 9(1), 37-42. Retrieve from https://www.ijisc.comPETRICĂ, G., MIHAI, I.C., 2020. Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime 9(1), 37-42. Available from: https://www.ijisc.comG. PETRICĂ, I.C. MIHAI, "Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 37-42, 2020. Available: https://www.ijisc.comPETRICĂ, G., MIHAI, I.C., 'Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 37-42, (2020).PETRICĂ, G.,MIHAI, I.C.,: Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime 9 (2020) 37-42. https://www.ijisc.comPETRICĂ, G., MIHAI, I.C., (2020), Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime, 9: 37-42. https://www.ijisc.com Citation Format :
PETRICĂ, G. (2019). A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8(2), 21-26. Retrieve from https://www.ijisc.comPETRICĂ, G., 2019. A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8(2), 21-26. Available from: https://www.ijisc.comG. PETRICĂ, "A Study on Password Strength in Wireless Encryption Protocols," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 21-26, 2019. Available: https://www.ijisc.comPETRICĂ, G., 'A Study on Password Strength in Wireless Encryption Protocols', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 21-26, (2019).PETRICĂ, G.: A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8 (2019) 21-26. https://www.ijisc.comPETRICĂ, G., (2019), A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8: 21-26. https://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: https://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. https://www.ijisc.com Citation Format :
PETRICĂ, G. (2016). Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime, 5(2), 87-94. Retrieve from https://www.ijisc.comPETRICĂ, G., 2016. Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime 5(2), 87-94. Available from: https://www.ijisc.comG. PETRICĂ, "Servers Configuration and Testing for Secure Exchange of Information over the Internet," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 87-94, 2016. Available: https://www.ijisc.comPETRICĂ, G., 'Servers Configuration and Testing for Secure Exchange of Information over the Internet', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 87-94, (2016).PETRICĂ, G.: Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime 5 (2016) 87-94. https://www.ijisc.comPETRICĂ, G., (2016), Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime, 5: 87-94. https://www.ijisc.com Citation Format :
BARBU, I.D.,PETRICĂ, G., (2015). Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4(1), 41-46. Retrieve from https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 2015. Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4(1), 41-46. Available from: https://www.ijisc.comI.D. BARBU, G. PETRICĂ, "Defense in Depth Principle to Ensure Information Security," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 41-46, 2015. Available: https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 'Defense in Depth Principle to Ensure Information Security', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 41-46, (2015).BARBU, I.D.,PETRICĂ, G.,: Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4 (2015) 41-46. https://www.ijisc.comBARBU, I.D., PETRICĂ, G., (2015), Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4: 41-46. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2014). Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3(1), 37-46. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2014. Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3(1), 37-46. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (II). Security Assurance," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 37-46, 2014. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (II). Security Assurance', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 37-46, (2014).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3 (2014) 37-46. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2014), Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3: 37-46. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2013). Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2(2), 61-68. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2013. Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2(2), 61-68. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (I). Types of Attacks," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 61-68, 2013. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (I). Types of Attacks', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 61-68, (2013).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2 (2013) 61-68. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2013), Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2: 61-68. https://www.ijisc.com Citation Format :