FRĂȚILĂ, A.I. (2020). Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9(2), 38-45. Retrieve from https://www.ijisc.comFRĂȚILĂ, A.I., 2020. Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9(2), 38-45. Available from: https://www.ijisc.comA.I. FRĂȚILĂ, "Analysis of Computer Malware and Common Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 38-45, 2020. Available: https://www.ijisc.comFRĂȚILĂ, A.I., 'Analysis of Computer Malware and Common Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 38-45, (2020).FRĂȚILĂ, A.I.: Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9 (2020) 38-45. https://www.ijisc.comFRĂȚILĂ, A.I., (2020), Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9: 38-45. https://www.ijisc.com Citation Format :
SUBAIRU, S.O.,ISAH, A.O.,ALHASSAN, J.K., (2017). Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6(1), 67-72. Retrieve from https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 2017. Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6(1), 67-72. Available from: https://www.ijisc.comS.O. SUBAIRU, A.O. ISAH, J.K. ALHASSAN, "Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 67-72, 2017. Available: https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 'Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 67-72, (2017).SUBAIRU, S.O.,ISAH, A.O.,ALHASSAN, J.K.,: Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6 (2017) 67-72. https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., (2017), Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6: 67-72. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G., (2015). Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4(2), 73-85. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 2015. Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4(2), 73-85. Available from: https://www.ijisc.comM.C. ŞCHEAU, L. ARSENE, G. DINCĂ, "Infection Vectors – Risk Factors for Financial Transactions," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 73-85, 2015. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 'Infection Vectors – Risk Factors for Financial Transactions', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 73-85, (2015).ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G.,: Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4 (2015) 73-85. https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., (2015), Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4: 73-85. https://www.ijisc.com Citation Format :
MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș., (2015). Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4(1), 9-14. Retrieve from https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 2015. Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4(1), 9-14. Available from: https://www.ijisc.comI.C. MIHAI, R. GENOE, Ș. PRUNĂ, "Strategies for Monitoring Website Security against Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 9-14, 2015. Available: https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 'Strategies for Monitoring Website Security against Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 9-14, (2015).MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș.,: Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4 (2015) 9-14. https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., (2015), Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4: 9-14. https://www.ijisc.com Citation Format :
GEANĂ, I.C. (2012). Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1(2), 17-24. Retrieve from https://www.ijisc.comGEANĂ, I.C., 2012. Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1(2), 17-24. Available from: https://www.ijisc.comI.C. GEANĂ, "Security Solutions for Informatics Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 17-24, 2012. Available: https://www.ijisc.comGEANĂ, I.C., 'Security Solutions for Informatics Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 17-24, (2012).GEANĂ, I.C.: Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1 (2012) 17-24. https://www.ijisc.comGEANĂ, I.C., (2012), Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1: 17-24. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :