DUMITRU, G.D. (2020). Social Networking Security. International Journal of Information Security and Cybercrime, 9(1), 24-28. Retrieve from https://www.ijisc.comDUMITRU, G.D., 2020. Social Networking Security. International Journal of Information Security and Cybercrime 9(1), 24-28. Available from: https://www.ijisc.comG.D. DUMITRU, "Social Networking Security," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 24-28, 2020. Available: https://www.ijisc.comDUMITRU, G.D., 'Social Networking Security', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 24-28, (2020).DUMITRU, G.D.: Social Networking Security. International Journal of Information Security and Cybercrime 9 (2020) 24-28. https://www.ijisc.comDUMITRU, G.D., (2020), Social Networking Security. International Journal of Information Security and Cybercrime, 9: 24-28. https://www.ijisc.com Citation Format :
AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A., (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8(2), 9-20. Retrieve from https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 2019. Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8(2), 9-20. Available from: https://www.ijisc.comA. AJIBOLA, I. UJATA, O. ADELAIYE, N.A. RAHMAN, "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 9-20, 2019. Available: https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 'Mitigating Advanced Persistent Threats: A Comparative Evaluation Review', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 9-20, (2019).AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A.,: Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8 (2019) 9-20. https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., (2019), Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8: 9-20. https://www.ijisc.com Citation Format :
BĂDIŢĂ, A.G. (2017). The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6(2), 17-22. Retrieve from https://www.ijisc.comBĂDIŢĂ, A.G., 2017. The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6(2), 17-22. Available from: https://www.ijisc.comA.G. BĂDIŢĂ, "The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 17-22, 2017. Available: https://www.ijisc.comBĂDIŢĂ, A.G., 'The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 17-22, (2017).BĂDIŢĂ, A.G.: The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6 (2017) 17-22. https://www.ijisc.comBĂDIŢĂ, A.G., (2017), The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6: 17-22. https://www.ijisc.com Citation Format :
ALEXANDRU, A.C. (2016). Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5(2), 17-24. Retrieve from https://www.ijisc.comALEXANDRU, A.C., 2016. Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5(2), 17-24. Available from: https://www.ijisc.comA.C. ALEXANDRU, "Information Security Aspects of Business Continuity Management," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 17-24, 2016. Available: https://www.ijisc.comALEXANDRU, A.C., 'Information Security Aspects of Business Continuity Management', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 17-24, (2016).ALEXANDRU, A.C.: Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5 (2016) 17-24. https://www.ijisc.comALEXANDRU, A.C., (2016), Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5: 17-24. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2016). Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5(2), 9-16. Retrieve from https://www.ijisc.comAXINTE, S.D., 2016. Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5(2), 9-16. Available from: https://www.ijisc.comS.D. AXINTE, "Security Challenges for Software Development Companies," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 9-16, 2016. Available: https://www.ijisc.comAXINTE, S.D., 'Security Challenges for Software Development Companies', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 9-16, (2016).AXINTE, S.D.: Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5 (2016) 9-16. https://www.ijisc.comAXINTE, S.D., (2016), Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5: 9-16. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2015). Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4(1), 59-62. Retrieve from https://www.ijisc.comOANCEA, C.V., 2015. Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4(1), 59-62. Available from: https://www.ijisc.comC.V. OANCEA, "Artificial Intelligence Role in Cybersecurity Infrastructures," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 59-62, 2015. Available: https://www.ijisc.comOANCEA, C.V., 'Artificial Intelligence Role in Cybersecurity Infrastructures', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 59-62, (2015).OANCEA, C.V.: Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4 (2015) 59-62. https://www.ijisc.comOANCEA, C.V., (2015), Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4: 59-62. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2014). Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3(2), 43-48. Retrieve from https://www.ijisc.comOANCEA, C.V., 2014. Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3(2), 43-48. Available from: https://www.ijisc.comC.V. OANCEA, "Cybersecurity in Cloud Computing Context," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 43-48, 2014. Available: https://www.ijisc.comOANCEA, C.V., 'Cybersecurity in Cloud Computing Context', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 43-48, (2014).OANCEA, C.V.: Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3 (2014) 43-48. https://www.ijisc.comOANCEA, C.V., (2014), Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3: 43-48. https://www.ijisc.com Citation Format :
BARBU, I.D.,PASCARIU, C., (2014). Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3(1), 29-36. Retrieve from https://www.ijisc.comBARBU, I.D., PASCARIU, C., 2014. Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3(1), 29-36. Available from: https://www.ijisc.comI.D. BARBU, C. PASCARIU, "Information Security Analyst Profile," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 29-36, 2014. Available: https://www.ijisc.comBARBU, I.D., PASCARIU, C., 'Information Security Analyst Profile', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 29-36, (2014).BARBU, I.D.,PASCARIU, C.,: Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comBARBU, I.D., PASCARIU, C., (2014), Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Security Standards Analysis. International Journal of Information Security and Cybercrime, 2(2), 27-34. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Security Standards Analysis. International Journal of Information Security and Cybercrime 2(2), 27-34. Available from: https://www.ijisc.comI.C. MIHAI, "Security Standards Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 27-34, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Security Standards Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 27-34, (2013).MIHAI, I.C.: Security Standards Analysis. International Journal of Information Security and Cybercrime 2 (2013) 27-34. https://www.ijisc.comMIHAI, I.C., (2013), Security Standards Analysis. International Journal of Information Security and Cybercrime, 2: 27-34. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1(1), 37-45. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1(1), 37-45. Available from: https://www.ijisc.comI.C. MIHAI, "Penetration Tests on Virtual Environment," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 37-45, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Penetration Tests on Virtual Environment', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 37-45, (2012).MIHAI, I.C.: Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1 (2012) 37-45. https://www.ijisc.comMIHAI, I.C., (2012), Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1: 37-45. https://www.ijisc.com Citation Format :