SEREȚEANU, A. (2013). Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2(1), 17-24. Retrieve from https://www.ijisc.comSEREȚEANU, A., 2013. Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2(1), 17-24. Available from: https://www.ijisc.comA. SEREȚEANU, "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 17-24, 2013. Available: https://www.ijisc.comSEREȚEANU, A., 'Security in Most Recent Generation of Mobile Telecommunication Networks – LTE', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 17-24, (2013).SEREȚEANU, A.: Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2 (2013) 17-24. https://www.ijisc.comSEREȚEANU, A., (2013), Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2: 17-24. https://www.ijisc.com Citation Format :
IANCU, L. (2012). An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1(2), 48-57. Retrieve from https://www.ijisc.comIANCU, L., 2012. An Overview of LTE Security. International Journal of Information Security and Cybercrime 1(2), 48-57. Available from: https://www.ijisc.comL. IANCU, "An Overview of LTE Security," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 48-57, 2012. Available: https://www.ijisc.comIANCU, L., 'An Overview of LTE Security', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 48-57, (2012).IANCU, L.: An Overview of LTE Security. International Journal of Information Security and Cybercrime 1 (2012) 48-57. https://www.ijisc.comIANCU, L., (2012), An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1: 48-57. https://www.ijisc.com Citation Format :