DESPA, A.R. (2023). Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime, 12(2), 35-42. Retrieve from https://www.ijisc.comDESPA, A.R., 2023. Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime 12(2), 35-42. Available from: https://www.ijisc.comA.R. DESPA, "Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 35-42, 2023. Available: https://www.ijisc.comDESPA, A.R., 'Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 35-42, (2023).DESPA, A.R.: Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime 12 (2023) 35-42. https://www.ijisc.comDESPA, A.R., (2023), Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime, 12: 35-42. https://www.ijisc.com Citation Format :
SINGH, G.,SHARMA, V., (2021). Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime, 10(1), 38-50. Retrieve from https://www.ijisc.comSINGH, G., SHARMA, V., 2021. Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime 10(1), 38-50. Available from: https://www.ijisc.comG. SINGH, V. SHARMA, "Cyber-Security and Its Future Challenges," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 38-50, 2021. Available: https://www.ijisc.comSINGH, G., SHARMA, V., 'Cyber-Security and Its Future Challenges', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 38-50, (2021).SINGH, G.,SHARMA, V.,: Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime 10 (2021) 38-50. https://www.ijisc.comSINGH, G., SHARMA, V., (2021), Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime, 10: 38-50. https://www.ijisc.com Citation Format :
FRĂȚILĂ, A.I. (2020). Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9(2), 38-45. Retrieve from https://www.ijisc.comFRĂȚILĂ, A.I., 2020. Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9(2), 38-45. Available from: https://www.ijisc.comA.I. FRĂȚILĂ, "Analysis of Computer Malware and Common Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 38-45, 2020. Available: https://www.ijisc.comFRĂȚILĂ, A.I., 'Analysis of Computer Malware and Common Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 38-45, (2020).FRĂȚILĂ, A.I.: Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9 (2020) 38-45. https://www.ijisc.comFRĂȚILĂ, A.I., (2020), Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9: 38-45. https://www.ijisc.com Citation Format :
MITRĂ, S.E. (2020). The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime, 9(1), 43-52. Retrieve from https://www.ijisc.comMITRĂ, S.E., 2020. The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime 9(1), 43-52. Available from: https://www.ijisc.comS.E. MITRĂ, "The Structure of Cyber Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 43-52, 2020. Available: https://www.ijisc.comMITRĂ, S.E., 'The Structure of Cyber Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 43-52, (2020).MITRĂ, S.E.: The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime 9 (2020) 43-52. https://www.ijisc.comMITRĂ, S.E., (2020), The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime, 9: 43-52. https://www.ijisc.com Citation Format :
MAREȘ, M.S. (2018). Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7(2), 41-51. Retrieve from https://www.ijisc.comMAREȘ, M.S., 2018. Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7(2), 41-51. Available from: https://www.ijisc.comM.S. MAREȘ, "Solutions to Secure a Network," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 41-51, 2018. Available: https://www.ijisc.comMAREȘ, M.S., 'Solutions to Secure a Network', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 41-51, (2018).MAREȘ, M.S.: Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7 (2018) 41-51. https://www.ijisc.comMAREȘ, M.S., (2018), Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7: 41-51. https://www.ijisc.com Citation Format :
TRIFAN, M. (2012). Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1(1), 46-54. Retrieve from https://www.ijisc.comTRIFAN, M., 2012. Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1(1), 46-54. Available from: https://www.ijisc.comM. TRIFAN, "Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 46-54, 2012. Available: https://www.ijisc.comTRIFAN, M., 'Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 46-54, (2012).TRIFAN, M.: Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1 (2012) 46-54. https://www.ijisc.comTRIFAN, M., (2012), Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1: 46-54. https://www.ijisc.com Citation Format :
BĂDESCU, C.M. (2012). Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1(1), 26-34. Retrieve from https://www.ijisc.comBĂDESCU, C.M., 2012. Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1(1), 26-34. Available from: https://www.ijisc.comC.M. BĂDESCU, "Solutions for Securing Computer Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 26-34, 2012. Available: https://www.ijisc.comBĂDESCU, C.M., 'Solutions for Securing Computer Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 26-34, (2012).BĂDESCU, C.M.: Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1 (2012) 26-34. https://www.ijisc.comBĂDESCU, C.M., (2012), Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1: 26-34. https://www.ijisc.com Citation Format :