COMAN, I.M. (2017). Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6(2), 47-52. Retrieve from https://www.ijisc.comCOMAN, I.M., 2017. Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6(2), 47-52. Available from: https://www.ijisc.comI.M. COMAN, "Cross-Border Cyber-Attacks and Critical Infrastructure Protection," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 47-52, 2017. Available: https://www.ijisc.comCOMAN, I.M., 'Cross-Border Cyber-Attacks and Critical Infrastructure Protection', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 47-52, (2017).COMAN, I.M.: Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6 (2017) 47-52. https://www.ijisc.comCOMAN, I.M., (2017), Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6: 47-52. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2017). Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6(1), 25-32. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2017. Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6(1), 25-32. Available from: https://www.ijisc.comM. DOBRINOIU, "Need for Education on Cybersecurity," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 25-32, 2017. Available: https://www.ijisc.comDOBRINOIU, M., 'Need for Education on Cybersecurity', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 25-32, (2017).DOBRINOIU, M.: Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6 (2017) 25-32. https://www.ijisc.comDOBRINOIU, M., (2017), Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6: 25-32. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2015). Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4(1), 59-62. Retrieve from https://www.ijisc.comOANCEA, C.V., 2015. Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4(1), 59-62. Available from: https://www.ijisc.comC.V. OANCEA, "Artificial Intelligence Role in Cybersecurity Infrastructures," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 59-62, 2015. Available: https://www.ijisc.comOANCEA, C.V., 'Artificial Intelligence Role in Cybersecurity Infrastructures', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 59-62, (2015).OANCEA, C.V.: Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4 (2015) 59-62. https://www.ijisc.comOANCEA, C.V., (2015), Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4: 59-62. https://www.ijisc.com Citation Format :
MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș., (2015). Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4(1), 9-14. Retrieve from https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 2015. Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4(1), 9-14. Available from: https://www.ijisc.comI.C. MIHAI, R. GENOE, Ș. PRUNĂ, "Strategies for Monitoring Website Security against Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 9-14, 2015. Available: https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 'Strategies for Monitoring Website Security against Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 9-14, (2015).MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș.,: Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4 (2015) 9-14. https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., (2015), Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4: 9-14. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2014). Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3(2), 43-48. Retrieve from https://www.ijisc.comOANCEA, C.V., 2014. Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3(2), 43-48. Available from: https://www.ijisc.comC.V. OANCEA, "Cybersecurity in Cloud Computing Context," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 43-48, 2014. Available: https://www.ijisc.comOANCEA, C.V., 'Cybersecurity in Cloud Computing Context', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 43-48, (2014).OANCEA, C.V.: Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3 (2014) 43-48. https://www.ijisc.comOANCEA, C.V., (2014), Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3: 43-48. https://www.ijisc.com Citation Format :