BELCIU (VASILESCU), A.C.,PREDA, M., (2024). Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime, 13(2), 18-32. Retrieve from https://www.ijisc.comBELCIU (VASILESCU), A.C., PREDA, M., 2024. Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime 13(2), 18-32. Available from: https://www.ijisc.comA.C. BELCIU (VASILESCU), M. PREDA, "Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 18-32, 2024. Available: https://www.ijisc.comBELCIU (VASILESCU), A.C., PREDA, M., 'Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 18-32, (2024).BELCIU (VASILESCU), A.C.,PREDA, M.,: Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime 13 (2024) 18-32. https://www.ijisc.comBELCIU (VASILESCU), A.C., PREDA, M., (2024), Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime, 13: 18-32. https://www.ijisc.com Citation Format :
OATU, L. (2024). Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13(1), 59-65. Retrieve from https://www.ijisc.comOATU, L., 2024. Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13(1), 59-65. Available from: https://www.ijisc.comL. OATU, "Combating Man-in-the-Middle Attacks within IoT Systems," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 59-65, 2024. Available: https://www.ijisc.comOATU, L., 'Combating Man-in-the-Middle Attacks within IoT Systems', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 59-65, (2024).OATU, L.: Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13 (2024) 59-65. https://www.ijisc.comOATU, L., (2024), Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13: 59-65. https://www.ijisc.com Citation Format :
MIHALACHE, D.N. (2023). Cloud Penetration Testing. International Journal of Information Security and Cybercrime, 12(2), 49-54. Retrieve from https://www.ijisc.comMIHALACHE, D.N., 2023. Cloud Penetration Testing. International Journal of Information Security and Cybercrime 12(2), 49-54. Available from: https://www.ijisc.comD.N. MIHALACHE, "Cloud Penetration Testing," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 49-54, 2023. Available: https://www.ijisc.comMIHALACHE, D.N., 'Cloud Penetration Testing', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 49-54, (2023).MIHALACHE, D.N.: Cloud Penetration Testing. International Journal of Information Security and Cybercrime 12 (2023) 49-54. https://www.ijisc.comMIHALACHE, D.N., (2023), Cloud Penetration Testing. International Journal of Information Security and Cybercrime, 12: 49-54. https://www.ijisc.com Citation Format :
SHARMA, R. (2022). Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime, 11(2), 50-63. Retrieve from https://www.ijisc.comSHARMA, R., 2022. Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime 11(2), 50-63. Available from: https://www.ijisc.comR. SHARMA, "Cyber Security to Safeguard Cyber Attacks," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 50-63, 2022. Available: https://www.ijisc.comSHARMA, R., 'Cyber Security to Safeguard Cyber Attacks', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 50-63, (2022).SHARMA, R.: Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime 11 (2022) 50-63. https://www.ijisc.comSHARMA, R., (2022), Cyber Security to Safeguard Cyber Attacks. International Journal of Information Security and Cybercrime, 11: 50-63. https://www.ijisc.com Citation Format :
HUMIED, I.A. (2022). Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11(2), 35-44. Retrieve from https://www.ijisc.comHUMIED, I.A., 2022. Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11(2), 35-44. Available from: https://www.ijisc.comI.A. HUMIED, "Cybersecurity as Emerging Challenge to Yemen Security," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 35-44, 2022. Available: https://www.ijisc.comHUMIED, I.A., 'Cybersecurity as Emerging Challenge to Yemen Security', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 35-44, (2022).HUMIED, I.A.: Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11 (2022) 35-44. https://www.ijisc.comHUMIED, I.A., (2022), Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11: 35-44. https://www.ijisc.com Citation Format :
PANDELICĂ, I.L. (2020). The Phenomenon of Cyber Crime. International Journal of Information Security and Cybercrime, 9(1), 29-36. Retrieve from https://www.ijisc.comPANDELICĂ, I.L., 2020. The Phenomenon of Cyber Crime. International Journal of Information Security and Cybercrime 9(1), 29-36. Available from: https://www.ijisc.comI.L. PANDELICĂ, "The Phenomenon of Cyber Crime," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 29-36, 2020. Available: https://www.ijisc.comPANDELICĂ, I.L., 'The Phenomenon of Cyber Crime', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 29-36, (2020).PANDELICĂ, I.L.: The Phenomenon of Cyber Crime. International Journal of Information Security and Cybercrime 9 (2020) 29-36. https://www.ijisc.comPANDELICĂ, I.L., (2020), The Phenomenon of Cyber Crime. International Journal of Information Security and Cybercrime, 9: 29-36. https://www.ijisc.com Citation Format :
PARASCHIVA, I. (2019). WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime, 8(1), 65-72. Retrieve from https://www.ijisc.comPARASCHIVA, I., 2019. WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime 8(1), 65-72. Available from: https://www.ijisc.comI. PARASCHIVA, "WannaCry Ransomware Attack from Romanian Police Perspective," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 65-72, 2019. Available: https://www.ijisc.comPARASCHIVA, I., 'WannaCry Ransomware Attack from Romanian Police Perspective', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 65-72, (2019).PARASCHIVA, I.: WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime 8 (2019) 65-72. https://www.ijisc.comPARASCHIVA, I., (2019), WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime, 8: 65-72. https://www.ijisc.com Citation Format :
COMAN, I.M. (2017). Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6(2), 47-52. Retrieve from https://www.ijisc.comCOMAN, I.M., 2017. Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6(2), 47-52. Available from: https://www.ijisc.comI.M. COMAN, "Cross-Border Cyber-Attacks and Critical Infrastructure Protection," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 47-52, 2017. Available: https://www.ijisc.comCOMAN, I.M., 'Cross-Border Cyber-Attacks and Critical Infrastructure Protection', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 47-52, (2017).COMAN, I.M.: Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6 (2017) 47-52. https://www.ijisc.comCOMAN, I.M., (2017), Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6: 47-52. https://www.ijisc.com Citation Format :
BARBU, I.D.,PETRICĂ, G., (2015). Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4(1), 41-46. Retrieve from https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 2015. Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4(1), 41-46. Available from: https://www.ijisc.comI.D. BARBU, G. PETRICĂ, "Defense in Depth Principle to Ensure Information Security," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 41-46, 2015. Available: https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 'Defense in Depth Principle to Ensure Information Security', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 41-46, (2015).BARBU, I.D.,PETRICĂ, G.,: Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4 (2015) 41-46. https://www.ijisc.comBARBU, I.D., PETRICĂ, G., (2015), Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4: 41-46. https://www.ijisc.com Citation Format :
MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș., (2015). Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4(1), 9-14. Retrieve from https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 2015. Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4(1), 9-14. Available from: https://www.ijisc.comI.C. MIHAI, R. GENOE, Ș. PRUNĂ, "Strategies for Monitoring Website Security against Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 9-14, 2015. Available: https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 'Strategies for Monitoring Website Security against Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 9-14, (2015).MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș.,: Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4 (2015) 9-14. https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., (2015), Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4: 9-14. https://www.ijisc.com Citation Format :
MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D., (2014). Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3(2), 37-42. Retrieve from https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 2014. Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3(2), 37-42. Available from: https://www.ijisc.comI.C. MIHAI, Ș. PRUNĂ, I.D. BARBU, "Cyber Kill Chain Analysis," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 37-42, 2014. Available: https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 'Cyber Kill Chain Analysis', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 37-42, (2014).MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D.,: Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3 (2014) 37-42. https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., (2014), Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3: 37-42. https://www.ijisc.com Citation Format :
MARIN, R.I. (2014). An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3(1), 47-52. Retrieve from https://www.ijisc.comMARIN, R.I., 2014. An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3(1), 47-52. Available from: https://www.ijisc.comR.I. MARIN, "An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 47-52, 2014. Available: https://www.ijisc.comMARIN, R.I., 'An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 47-52, (2014).MARIN, R.I.: An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3 (2014) 47-52. https://www.ijisc.comMARIN, R.I., (2014), An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3: 47-52. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1(2), 61-67. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1(2), 61-67. Available from: https://www.ijisc.comI.C. MIHAI, "Overview on Phishing Attacks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 61-67, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Overview on Phishing Attacks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 61-67, (2012).MIHAI, I.C.: Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1 (2012) 61-67. https://www.ijisc.comMIHAI, I.C., (2012), Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1: 61-67. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :