PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2018). Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7(2), 9-13. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2018. Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7(2), 9-13. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Using Embedded Platforms to Monitor Network Security," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 9-13, 2018. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Using Embedded Platforms to Monitor Network Security', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 9-13, (2018).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7 (2018) 9-13. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2018), Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7: 9-13. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D., (2015). Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4(2), 27-32. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., 2015. Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4(2), 27-32. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, "Ransomware – an Emerging Threat," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 27-32, 2015. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., 'Ransomware – an Emerging Threat', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 27-32, (2015).PASCARIU, C.,BARBU, I.D.,: Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comPASCARIU, C., BARBU, I.D., (2015), Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
BARBU, I.D.,PETRICĂ, G., (2015). Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4(1), 41-46. Retrieve from https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 2015. Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4(1), 41-46. Available from: https://www.ijisc.comI.D. BARBU, G. PETRICĂ, "Defense in Depth Principle to Ensure Information Security," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 41-46, 2015. Available: https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 'Defense in Depth Principle to Ensure Information Security', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 41-46, (2015).BARBU, I.D.,PETRICĂ, G.,: Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4 (2015) 41-46. https://www.ijisc.comBARBU, I.D., PETRICĂ, G., (2015), Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4: 41-46. https://www.ijisc.com Citation Format :
BARBU, I.D.,BACIVAROV, I., (2014). Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3(2), 49-60. Retrieve from https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 2014. Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3(2), 49-60. Available from: https://www.ijisc.comI.D. BARBU, I. BACIVAROV, "Heartbleed – The Vulnerability That Changed the Internet," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 49-60, 2014. Available: https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 'Heartbleed – The Vulnerability That Changed the Internet', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 49-60, (2014).BARBU, I.D.,BACIVAROV, I.,: Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3 (2014) 49-60. https://www.ijisc.comBARBU, I.D., BACIVAROV, I., (2014), Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3: 49-60. https://www.ijisc.com Citation Format :
MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D., (2014). Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3(2), 37-42. Retrieve from https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 2014. Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3(2), 37-42. Available from: https://www.ijisc.comI.C. MIHAI, Ș. PRUNĂ, I.D. BARBU, "Cyber Kill Chain Analysis," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 37-42, 2014. Available: https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 'Cyber Kill Chain Analysis', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 37-42, (2014).MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D.,: Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3 (2014) 37-42. https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., (2014), Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3: 37-42. https://www.ijisc.com Citation Format :
BARBU, I.D.,PASCARIU, C., (2014). Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3(1), 29-36. Retrieve from https://www.ijisc.comBARBU, I.D., PASCARIU, C., 2014. Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3(1), 29-36. Available from: https://www.ijisc.comI.D. BARBU, C. PASCARIU, "Information Security Analyst Profile," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 29-36, 2014. Available: https://www.ijisc.comBARBU, I.D., PASCARIU, C., 'Information Security Analyst Profile', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 29-36, (2014).BARBU, I.D.,PASCARIU, C.,: Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comBARBU, I.D., PASCARIU, C., (2014), Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
BARBU, I.D. (2013). Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2(2), 43-54. Retrieve from https://www.ijisc.comBARBU, I.D., 2013. Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2(2), 43-54. Available from: https://www.ijisc.comI.D. BARBU, "Buffer Overflow Vulnerability Exploitation Using Open-Source Tools," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 43-54, 2013. Available: https://www.ijisc.comBARBU, I.D., 'Buffer Overflow Vulnerability Exploitation Using Open-Source Tools', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 43-54, (2013).BARBU, I.D.: Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2 (2013) 43-54. https://www.ijisc.comBARBU, I.D., (2013), Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2: 43-54. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :