STOICA, I.T. (2024). The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13(1), 49-58. Retrieve from https://www.ijisc.comSTOICA, I.T., 2024. The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13(1), 49-58. Available from: https://www.ijisc.comI.T. STOICA, "The Future Risk of Biometric Data Theft in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 49-58, 2024. Available: https://www.ijisc.comSTOICA, I.T., 'The Future Risk of Biometric Data Theft in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 49-58, (2024).STOICA, I.T.: The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13 (2024) 49-58. https://www.ijisc.comSTOICA, I.T., (2024), The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13: 49-58. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :
NĂSTASE, L. (2017). Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6(1), 51-56. Retrieve from https://www.ijisc.comNĂSTASE, L., 2017. Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6(1), 51-56. Available from: https://www.ijisc.comL. NĂSTASE, "Public Key Infrastructures for Trust and Authentication in the IoT," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 51-56, 2017. Available: https://www.ijisc.comNĂSTASE, L., 'Public Key Infrastructures for Trust and Authentication in the IoT', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 51-56, (2017).NĂSTASE, L.: Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6 (2017) 51-56. https://www.ijisc.comNĂSTASE, L., (2017), Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6: 51-56. https://www.ijisc.com Citation Format :
SHARMA, P.,GUPTA, G., (2016). Security Problems in Sensor Network. International Journal of Information Security and Cybercrime, 5(1), 69-74. Retrieve from https://www.ijisc.comSHARMA, P., GUPTA, G., 2016. Security Problems in Sensor Network. International Journal of Information Security and Cybercrime 5(1), 69-74. Available from: https://www.ijisc.comP. SHARMA, G. GUPTA, "Security Problems in Sensor Network," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 69-74, 2016. Available: https://www.ijisc.comSHARMA, P., GUPTA, G., 'Security Problems in Sensor Network', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 69-74, (2016).SHARMA, P.,GUPTA, G.,: Security Problems in Sensor Network. International Journal of Information Security and Cybercrime 5 (2016) 69-74. https://www.ijisc.comSHARMA, P., GUPTA, G., (2016), Security Problems in Sensor Network. International Journal of Information Security and Cybercrime, 5: 69-74. https://www.ijisc.com Citation Format :
NWOYE, C.J. (2015). Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4(2), 61-72. Retrieve from https://www.ijisc.comNWOYE, C.J., 2015. Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4(2), 61-72. Available from: https://www.ijisc.comC.J. NWOYE, "Cybercrime Prevention in Online Transaction Using Biometric Access Control," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 61-72, 2015. Available: https://www.ijisc.comNWOYE, C.J., 'Cybercrime Prevention in Online Transaction Using Biometric Access Control', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 61-72, (2015).NWOYE, C.J.: Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4 (2015) 61-72. https://www.ijisc.comNWOYE, C.J., (2015), Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4: 61-72. https://www.ijisc.com Citation Format :
SEREȚEANU, A. (2013). Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2(1), 17-24. Retrieve from https://www.ijisc.comSEREȚEANU, A., 2013. Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2(1), 17-24. Available from: https://www.ijisc.comA. SEREȚEANU, "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 17-24, 2013. Available: https://www.ijisc.comSEREȚEANU, A., 'Security in Most Recent Generation of Mobile Telecommunication Networks – LTE', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 17-24, (2013).SEREȚEANU, A.: Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2 (2013) 17-24. https://www.ijisc.comSEREȚEANU, A., (2013), Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2: 17-24. https://www.ijisc.com Citation Format :
IANCU, L. (2012). An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1(2), 48-57. Retrieve from https://www.ijisc.comIANCU, L., 2012. An Overview of LTE Security. International Journal of Information Security and Cybercrime 1(2), 48-57. Available from: https://www.ijisc.comL. IANCU, "An Overview of LTE Security," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 48-57, 2012. Available: https://www.ijisc.comIANCU, L., 'An Overview of LTE Security', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 48-57, (2012).IANCU, L.: An Overview of LTE Security. International Journal of Information Security and Cybercrime 1 (2012) 48-57. https://www.ijisc.comIANCU, L., (2012), An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1: 48-57. https://www.ijisc.com Citation Format :
VOICU, M. (2012). LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1(1), 19-25. Retrieve from https://www.ijisc.comVOICU, M., 2012. LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1(1), 19-25. Available from: https://www.ijisc.comM. VOICU, "LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 19-25, 2012. Available: https://www.ijisc.comVOICU, M., 'LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 19-25, (2012).VOICU, M.: LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1 (2012) 19-25. https://www.ijisc.comVOICU, M., (2012), LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1: 19-25. https://www.ijisc.com Citation Format :