AMIN, R. (2024). Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime, 13(1), 33-48. Retrieve from https://www.ijisc.comAMIN, R., 2024. Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime 13(1), 33-48. Available from: https://www.ijisc.comR. AMIN, "Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 33-48, 2024. Available: https://www.ijisc.comAMIN, R., 'Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 33-48, (2024).AMIN, R.: Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime 13 (2024) 33-48. https://www.ijisc.comAMIN, R., (2024), Causes and Consequences of Cyberbullying Against Women in Bangladesh: A Comprehensive Study. International Journal of Information Security and Cybercrime, 13: 33-48. https://www.ijisc.com Citation Format :
SHAHJAHAN, M.,MIAH, A.K., (2023). Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime, 12(2), 43-48. Retrieve from https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., 2023. Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime 12(2), 43-48. Available from: https://www.ijisc.comM. SHAHJAHAN, A.K. MIAH, "Pattern of Cybercrime among Adolescents: An Exploratory Study," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 43-48, 2023. Available: https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., 'Pattern of Cybercrime among Adolescents: An Exploratory Study', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 43-48, (2023).SHAHJAHAN, M.,MIAH, A.K.,: Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime 12 (2023) 43-48. https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., (2023), Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime, 12: 43-48. https://www.ijisc.com Citation Format :
VERMA, A. (2022). Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime, 11(2), 64-71. Retrieve from https://www.ijisc.comVERMA, A., 2022. Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime 11(2), 64-71. Available from: https://www.ijisc.comA. VERMA, "Game Changer in Cybersecurity: Quantum Cryptography," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 64-71, 2022. Available: https://www.ijisc.comVERMA, A., 'Game Changer in Cybersecurity: Quantum Cryptography', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 64-71, (2022).VERMA, A.: Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime 11 (2022) 64-71. https://www.ijisc.comVERMA, A., (2022), Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime, 11: 64-71. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2017). Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6(1), 25-32. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2017. Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6(1), 25-32. Available from: https://www.ijisc.comM. DOBRINOIU, "Need for Education on Cybersecurity," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 25-32, 2017. Available: https://www.ijisc.comDOBRINOIU, M., 'Need for Education on Cybersecurity', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 25-32, (2017).DOBRINOIU, M.: Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6 (2017) 25-32. https://www.ijisc.comDOBRINOIU, M., (2017), Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6: 25-32. https://www.ijisc.com Citation Format :
GRIGORAȘ, A. (2013). The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2(1), 25-34. Retrieve from https://www.ijisc.comGRIGORAȘ, A., 2013. The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2(1), 25-34. Available from: https://www.ijisc.comA. GRIGORAȘ, "The Security of Cloud Networks," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 25-34, 2013. Available: https://www.ijisc.comGRIGORAȘ, A., 'The Security of Cloud Networks', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 25-34, (2013).GRIGORAȘ, A.: The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2 (2013) 25-34. https://www.ijisc.comGRIGORAȘ, A., (2013), The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2: 25-34. https://www.ijisc.com Citation Format :