PETRICĂ, G. (2019). A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8(2), 21-26. Retrieve from https://www.ijisc.comPETRICĂ, G., 2019. A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8(2), 21-26. Available from: https://www.ijisc.comG. PETRICĂ, "A Study on Password Strength in Wireless Encryption Protocols," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 21-26, 2019. Available: https://www.ijisc.comPETRICĂ, G., 'A Study on Password Strength in Wireless Encryption Protocols', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 21-26, (2019).PETRICĂ, G.: A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8 (2019) 21-26. https://www.ijisc.comPETRICĂ, G., (2019), A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8: 21-26. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
NĂSTASE, L. (2017). Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6(1), 51-56. Retrieve from https://www.ijisc.comNĂSTASE, L., 2017. Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6(1), 51-56. Available from: https://www.ijisc.comL. NĂSTASE, "Public Key Infrastructures for Trust and Authentication in the IoT," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 51-56, 2017. Available: https://www.ijisc.comNĂSTASE, L., 'Public Key Infrastructures for Trust and Authentication in the IoT', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 51-56, (2017).NĂSTASE, L.: Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6 (2017) 51-56. https://www.ijisc.comNĂSTASE, L., (2017), Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6: 51-56. https://www.ijisc.com Citation Format :
PRICOPE, R. (2017). Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6(1), 33-40. Retrieve from https://www.ijisc.comPRICOPE, R., 2017. Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6(1), 33-40. Available from: https://www.ijisc.comR. PRICOPE, "Hardware and Software Technologies used in the Financial Industry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 33-40, 2017. Available: https://www.ijisc.comPRICOPE, R., 'Hardware and Software Technologies used in the Financial Industry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 33-40, (2017).PRICOPE, R.: Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6 (2017) 33-40. https://www.ijisc.comPRICOPE, R., (2017), Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6: 33-40. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D., (2015). Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4(2), 27-32. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., 2015. Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4(2), 27-32. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, "Ransomware – an Emerging Threat," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 27-32, 2015. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., 'Ransomware – an Emerging Threat', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 27-32, (2015).PASCARIU, C.,BARBU, I.D.,: Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comPASCARIU, C., BARBU, I.D., (2015), Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from https://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: https://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: https://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. https://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. https://www.ijisc.com Citation Format :
VOICU, M. (2012). LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1(1), 19-25. Retrieve from https://www.ijisc.comVOICU, M., 2012. LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1(1), 19-25. Available from: https://www.ijisc.comM. VOICU, "LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 19-25, 2012. Available: https://www.ijisc.comVOICU, M., 'LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 19-25, (2012).VOICU, M.: LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1 (2012) 19-25. https://www.ijisc.comVOICU, M., (2012), LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1: 19-25. https://www.ijisc.com Citation Format :