GHERGHINA, C.,PETRICĂ, G., (2014). Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3(1), 37-46. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2014. Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3(1), 37-46. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (II). Security Assurance," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 37-46, 2014. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (II). Security Assurance', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 37-46, (2014).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3 (2014) 37-46. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2014), Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3: 37-46. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2013). Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2(2), 61-68. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2013. Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2(2), 61-68. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (I). Types of Attacks," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 61-68, 2013. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (I). Types of Attacks', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 61-68, (2013).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2 (2013) 61-68. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2013), Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2: 61-68. https://www.ijisc.com Citation Format :
ISAC, B. (2013). Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2(2), 35-42. Retrieve from https://www.ijisc.comISAC, B., 2013. Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2(2), 35-42. Available from: https://www.ijisc.comB. ISAC, "Issues and Challenges in Cloud Computing Architectures," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 35-42, 2013. Available: https://www.ijisc.comISAC, B., 'Issues and Challenges in Cloud Computing Architectures', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 35-42, (2013).ISAC, B.: Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comISAC, B., (2013), Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
IANCU, L. (2012). An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1(2), 48-57. Retrieve from https://www.ijisc.comIANCU, L., 2012. An Overview of LTE Security. International Journal of Information Security and Cybercrime 1(2), 48-57. Available from: https://www.ijisc.comL. IANCU, "An Overview of LTE Security," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 48-57, 2012. Available: https://www.ijisc.comIANCU, L., 'An Overview of LTE Security', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 48-57, (2012).IANCU, L.: An Overview of LTE Security. International Journal of Information Security and Cybercrime 1 (2012) 48-57. https://www.ijisc.comIANCU, L., (2012), An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1: 48-57. https://www.ijisc.com Citation Format :
COSTEA, I. (2012). Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1(2), 40-47. Retrieve from https://www.ijisc.comCOSTEA, I., 2012. Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1(2), 40-47. Available from: https://www.ijisc.comI. COSTEA, "Data Privacy Assurance in Virtual Private Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 40-47, 2012. Available: https://www.ijisc.comCOSTEA, I., 'Data Privacy Assurance in Virtual Private Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 40-47, (2012).COSTEA, I.: Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1 (2012) 40-47. https://www.ijisc.comCOSTEA, I., (2012), Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1: 40-47. https://www.ijisc.com Citation Format :