PETRICĂ, G.,MIHAI, I.C., (2020). Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime, 9(1), 37-42. Retrieve from https://www.ijisc.comPETRICĂ, G., MIHAI, I.C., 2020. Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime 9(1), 37-42. Available from: https://www.ijisc.comG. PETRICĂ, I.C. MIHAI, "Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 37-42, 2020. Available: https://www.ijisc.comPETRICĂ, G., MIHAI, I.C., 'Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 37-42, (2020).PETRICĂ, G.,MIHAI, I.C.,: Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime 9 (2020) 37-42. https://www.ijisc.comPETRICĂ, G., MIHAI, I.C., (2020), Cyber Attacks Against E-Learning Platforms. A Case Study Using Attack Trees. International Journal of Information Security and Cybercrime, 9: 37-42. https://www.ijisc.com Citation Format :
MIHAI, I.C.,ZETU, C., (2019). Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8(2), 89-96. Retrieve from https://www.ijisc.comMIHAI, I.C., ZETU, C., 2019. Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8(2), 89-96. Available from: https://www.ijisc.comI.C. MIHAI, C. ZETU, "Romanian Law Enforcement Involvement in Fighting Cyber Crime," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 89-96, 2019. Available: https://www.ijisc.comMIHAI, I.C., ZETU, C., 'Romanian Law Enforcement Involvement in Fighting Cyber Crime', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 89-96, (2019).MIHAI, I.C.,ZETU, C.,: Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8 (2019) 89-96. https://www.ijisc.comMIHAI, I.C., ZETU, C., (2019), Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8: 89-96. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2016). Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime, 5(2), 25-30. Retrieve from https://www.ijisc.comMIHAI, I.C., 2016. Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime 5(2), 25-30. Available from: https://www.ijisc.comI.C. MIHAI, "Romanian Legislation on Cybercrime," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 25-30, 2016. Available: https://www.ijisc.comMIHAI, I.C., 'Romanian Legislation on Cybercrime', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 25-30, (2016).MIHAI, I.C.: Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime 5 (2016) 25-30. https://www.ijisc.comMIHAI, I.C., (2016), Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime, 5: 25-30. https://www.ijisc.com Citation Format :
MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș., (2015). Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4(1), 9-14. Retrieve from https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 2015. Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4(1), 9-14. Available from: https://www.ijisc.comI.C. MIHAI, R. GENOE, Ș. PRUNĂ, "Strategies for Monitoring Website Security against Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 9-14, 2015. Available: https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 'Strategies for Monitoring Website Security against Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 9-14, (2015).MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș.,: Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4 (2015) 9-14. https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., (2015), Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4: 9-14. https://www.ijisc.com Citation Format :
MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D., (2014). Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3(2), 37-42. Retrieve from https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 2014. Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3(2), 37-42. Available from: https://www.ijisc.comI.C. MIHAI, Ș. PRUNĂ, I.D. BARBU, "Cyber Kill Chain Analysis," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 37-42, 2014. Available: https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 'Cyber Kill Chain Analysis', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 37-42, (2014).MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D.,: Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3 (2014) 37-42. https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., (2014), Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3: 37-42. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Security Standards Analysis. International Journal of Information Security and Cybercrime, 2(2), 27-34. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Security Standards Analysis. International Journal of Information Security and Cybercrime 2(2), 27-34. Available from: https://www.ijisc.comI.C. MIHAI, "Security Standards Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 27-34, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Security Standards Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 27-34, (2013).MIHAI, I.C.: Security Standards Analysis. International Journal of Information Security and Cybercrime 2 (2013) 27-34. https://www.ijisc.comMIHAI, I.C., (2013), Security Standards Analysis. International Journal of Information Security and Cybercrime, 2: 27-34. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2(1), 35-42. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2(1), 35-42. Available from: https://www.ijisc.comI.C. MIHAI, "Comparative Study between Traditional Security and Survivability," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 35-42, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Comparative Study between Traditional Security and Survivability', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 35-42, (2013).MIHAI, I.C.: Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comMIHAI, I.C., (2013), Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1(2), 61-67. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1(2), 61-67. Available from: https://www.ijisc.comI.C. MIHAI, "Overview on Phishing Attacks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 61-67, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Overview on Phishing Attacks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 61-67, (2012).MIHAI, I.C.: Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1 (2012) 61-67. https://www.ijisc.comMIHAI, I.C., (2012), Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1: 61-67. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1(1), 37-45. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1(1), 37-45. Available from: https://www.ijisc.comI.C. MIHAI, "Penetration Tests on Virtual Environment," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 37-45, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Penetration Tests on Virtual Environment', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 37-45, (2012).MIHAI, I.C.: Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1 (2012) 37-45. https://www.ijisc.comMIHAI, I.C., (2012), Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1: 37-45. https://www.ijisc.com Citation Format :
BACIVAROV, I.,MIHAI, I.C., (2012). Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1(1), 8-14. Retrieve from https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 2012. Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1(1), 8-14. Available from: https://www.ijisc.comI. BACIVAROV, I.C. MIHAI, "Access Rights Analysis in Microsoft Windows and Linux Operating Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 8-14, 2012. Available: https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 'Access Rights Analysis in Microsoft Windows and Linux Operating Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 8-14, (2012).BACIVAROV, I.,MIHAI, I.C.,: Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1 (2012) 8-14. https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., (2012), Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1: 8-14. https://www.ijisc.com Citation Format :