MITRĂ, S.E. (2020). The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime, 9(1), 43-52. Retrieve from https://www.ijisc.comMITRĂ, S.E., 2020. The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime 9(1), 43-52. Available from: https://www.ijisc.comS.E. MITRĂ, "The Structure of Cyber Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 43-52, 2020. Available: https://www.ijisc.comMITRĂ, S.E., 'The Structure of Cyber Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 43-52, (2020).MITRĂ, S.E.: The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime 9 (2020) 43-52. https://www.ijisc.comMITRĂ, S.E., (2020), The Structure of Cyber Attacks. International Journal of Information Security and Cybercrime, 9: 43-52. https://www.ijisc.com Citation Format :
PEȚA, C. (2013). Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2(2), 55-60. Retrieve from https://www.ijisc.comPEȚA, C., 2013. Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2(2), 55-60. Available from: https://www.ijisc.comC. PEȚA, "Legislative Aspects of Cybersecurity," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 55-60, 2013. Available: https://www.ijisc.comPEȚA, C., 'Legislative Aspects of Cybersecurity', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 55-60, (2013).PEȚA, C.: Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2 (2013) 55-60. https://www.ijisc.comPEȚA, C., (2013), Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2: 55-60. https://www.ijisc.com Citation Format :