DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I., (2024). Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime, 13(2), 52-58. Retrieve from https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 2024. Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime 13(2), 52-58. Available from: https://www.ijisc.comA.M. DINCĂ, S.D. AXINTE, I. BACIVAROV, "Trust and Security in AI-Generated Documentation," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 52-58, 2024. Available: https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 'Trust and Security in AI-Generated Documentation', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 52-58, (2024).DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I.,: Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime 13 (2024) 52-58. https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., (2024), Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime, 13: 52-58. https://www.ijisc.com Citation Format :
DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I., (2022). Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime, 11(2), 29-34. Retrieve from https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 2022. Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime 11(2), 29-34. Available from: https://www.ijisc.comA.M. DINCĂ, S.D. AXINTE, I. BACIVAROV, "Performance Enhancements for Database Transactions," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 29-34, 2022. Available: https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 'Performance Enhancements for Database Transactions', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 29-34, (2022).DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I.,: Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime 11 (2022) 29-34. https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., (2022), Performance Enhancements for Database Transactions. International Journal of Information Security and Cybercrime, 11: 29-34. https://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: https://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2016). Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5(2), 9-16. Retrieve from https://www.ijisc.comAXINTE, S.D., 2016. Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5(2), 9-16. Available from: https://www.ijisc.comS.D. AXINTE, "Security Challenges for Software Development Companies," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 9-16, 2016. Available: https://www.ijisc.comAXINTE, S.D., 'Security Challenges for Software Development Companies', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 9-16, (2016).AXINTE, S.D.: Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5 (2016) 9-16. https://www.ijisc.comAXINTE, S.D., (2016), Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5: 9-16. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2014). SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3(2), 61-68. Retrieve from https://www.ijisc.comAXINTE, S.D., 2014. SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3(2), 61-68. Available from: https://www.ijisc.comS.D. AXINTE, "SQL Injection Testing in Web Applications Using SQLmap," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 61-68, 2014. Available: https://www.ijisc.comAXINTE, S.D., 'SQL Injection Testing in Web Applications Using SQLmap', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 61-68, (2014).AXINTE, S.D.: SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3 (2014) 61-68. https://www.ijisc.comAXINTE, S.D., (2014), SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3: 61-68. https://www.ijisc.com Citation Format :