MIHAI, I.C. (2013). Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2(1), 35-42. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2(1), 35-42. Available from: https://www.ijisc.comI.C. MIHAI, "Comparative Study between Traditional Security and Survivability," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 35-42, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Comparative Study between Traditional Security and Survivability', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 35-42, (2013).MIHAI, I.C.: Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comMIHAI, I.C., (2013), Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
BĂDESCU, C.M. (2012). Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1(1), 26-34. Retrieve from https://www.ijisc.comBĂDESCU, C.M., 2012. Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1(1), 26-34. Available from: https://www.ijisc.comC.M. BĂDESCU, "Solutions for Securing Computer Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 26-34, 2012. Available: https://www.ijisc.comBĂDESCU, C.M., 'Solutions for Securing Computer Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 26-34, (2012).BĂDESCU, C.M.: Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1 (2012) 26-34. https://www.ijisc.comBĂDESCU, C.M., (2012), Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1: 26-34. https://www.ijisc.com Citation Format :