BACÎŞ, I.B. (2021). Types of Threats and Appropriate Countermeasures for Internet Communications. International Journal of Information Security and Cybercrime, 10(1), 27-37. Retrieve from https://www.ijisc.comBACÎŞ, I.B., 2021. Types of Threats and Appropriate Countermeasures for Internet Communications. International Journal of Information Security and Cybercrime 10(1), 27-37. Available from: https://www.ijisc.comI.B. BACÎŞ, "Types of Threats and Appropriate Countermeasures for Internet Communications," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 27-37, 2021. Available: https://www.ijisc.comBACÎŞ, I.B., 'Types of Threats and Appropriate Countermeasures for Internet Communications', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 27-37, (2021).BACÎŞ, I.B.: Types of Threats and Appropriate Countermeasures for Internet Communications. International Journal of Information Security and Cybercrime 10 (2021) 27-37. https://www.ijisc.comBACÎŞ, I.B., (2021), Types of Threats and Appropriate Countermeasures for Internet Communications. International Journal of Information Security and Cybercrime, 10: 27-37. https://www.ijisc.com Citation Format :
BOROȘEANU, E.I. (2018). Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime, 7(2), 33-40. Retrieve from https://www.ijisc.comBOROȘEANU, E.I., 2018. Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime 7(2), 33-40. Available from: https://www.ijisc.comE.I. BOROȘEANU, "Wi-Fi Security Dedicated Architectures," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 33-40, 2018. Available: https://www.ijisc.comBOROȘEANU, E.I., 'Wi-Fi Security Dedicated Architectures', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 33-40, (2018).BOROȘEANU, E.I.: Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime 7 (2018) 33-40. https://www.ijisc.comBOROȘEANU, E.I., (2018), Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime, 7: 33-40. https://www.ijisc.com Citation Format :
CERNOV, A.M. (2018). Security in Computer Networks. International Journal of Information Security and Cybercrime, 7(1), 45-52. Retrieve from https://www.ijisc.comCERNOV, A.M., 2018. Security in Computer Networks. International Journal of Information Security and Cybercrime 7(1), 45-52. Available from: https://www.ijisc.comA.M. CERNOV, "Security in Computer Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 45-52, 2018. Available: https://www.ijisc.comCERNOV, A.M., 'Security in Computer Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 45-52, (2018).CERNOV, A.M.: Security in Computer Networks. International Journal of Information Security and Cybercrime 7 (2018) 45-52. https://www.ijisc.comCERNOV, A.M., (2018), Security in Computer Networks. International Journal of Information Security and Cybercrime, 7: 45-52. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :
CONSTANTIN, A. (2013). Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2(1), 43-48. Retrieve from https://www.ijisc.comCONSTANTIN, A., 2013. Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2(1), 43-48. Available from: https://www.ijisc.comA. CONSTANTIN, "Cybercrime and National Security in the Context of Globalization," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 43-48, 2013. Available: https://www.ijisc.comCONSTANTIN, A., 'Cybercrime and National Security in the Context of Globalization', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 43-48, (2013).CONSTANTIN, A.: Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2 (2013) 43-48. https://www.ijisc.comCONSTANTIN, A., (2013), Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2: 43-48. https://www.ijisc.com Citation Format :
GHERGHINA, C. (2012). Cyberterrorism. International Journal of Information Security and Cybercrime, 1(2), 33-39. Retrieve from https://www.ijisc.comGHERGHINA, C., 2012. Cyberterrorism. International Journal of Information Security and Cybercrime 1(2), 33-39. Available from: https://www.ijisc.comC. GHERGHINA, "Cyberterrorism," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 33-39, 2012. Available: https://www.ijisc.comGHERGHINA, C., 'Cyberterrorism', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 33-39, (2012).GHERGHINA, C.: Cyberterrorism. International Journal of Information Security and Cybercrime 1 (2012) 33-39. https://www.ijisc.comGHERGHINA, C., (2012), Cyberterrorism. International Journal of Information Security and Cybercrime, 1: 33-39. https://www.ijisc.com Citation Format :