VASILOIU, R.E. (2024). Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime, 13(1), 20-32. Retrieve from https://www.ijisc.comVASILOIU, R.E., 2024. Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime 13(1), 20-32. Available from: https://www.ijisc.comR.E. VASILOIU, "Cyber Security – Current and Future Trends," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 20-32, 2024. Available: https://www.ijisc.comVASILOIU, R.E., 'Cyber Security – Current and Future Trends', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 20-32, (2024).VASILOIU, R.E.: Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime 13 (2024) 20-32. https://www.ijisc.comVASILOIU, R.E., (2024), Cyber Security – Current and Future Trends. International Journal of Information Security and Cybercrime, 13: 20-32. https://www.ijisc.com Citation Format :
ABDULHAMID, M.,GICHUKI, N., (2019). Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8(1), 13-22. Retrieve from https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 2019. Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8(1), 13-22. Available from: https://www.ijisc.comM. ABDULHAMID, N. GICHUKI, "Comparative Study of Cryptographic Algorithms," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 13-22, 2019. Available: https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 'Comparative Study of Cryptographic Algorithms', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 13-22, (2019).ABDULHAMID, M.,GICHUKI, N.,: Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8 (2019) 13-22. https://www.ijisc.comABDULHAMID, M., GICHUKI, N., (2019), Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8: 13-22. https://www.ijisc.com Citation Format :