TOD-RĂILEANU, G.,BACIVAROV, I., (2023). An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime, 12(2), 23-26. Retrieve from https://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., 2023. An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime 12(2), 23-26. Available from: https://www.ijisc.comG. TOD-RĂILEANU, I. BACIVAROV, "An Overview on Artificial Intelligence Applied in Offensive Cybersecurity," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 23-26, 2023. Available: https://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., 'An Overview on Artificial Intelligence Applied in Offensive Cybersecurity', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 23-26, (2023).TOD-RĂILEANU, G.,BACIVAROV, I.,: An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime 12 (2023) 23-26. https://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., (2023), An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime, 12: 23-26. https://www.ijisc.com Citation Format :
AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A., (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8(2), 9-20. Retrieve from https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 2019. Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8(2), 9-20. Available from: https://www.ijisc.comA. AJIBOLA, I. UJATA, O. ADELAIYE, N.A. RAHMAN, "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 9-20, 2019. Available: https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 'Mitigating Advanced Persistent Threats: A Comparative Evaluation Review', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 9-20, (2019).AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A.,: Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8 (2019) 9-20. https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., (2019), Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8: 9-20. https://www.ijisc.com Citation Format :
FIDA, M.,JOVITH, A.A., (2016). Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5(1), 75-80. Retrieve from https://www.ijisc.comFIDA, M., JOVITH, A.A., 2016. Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5(1), 75-80. Available from: https://www.ijisc.comM. FIDA, A.A. JOVITH, "Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 75-80, 2016. Available: https://www.ijisc.comFIDA, M., JOVITH, A.A., 'Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 75-80, (2016).FIDA, M.,JOVITH, A.A.,: Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5 (2016) 75-80. https://www.ijisc.comFIDA, M., JOVITH, A.A., (2016), Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5: 75-80. https://www.ijisc.com Citation Format :
PRIPAS, M.I. (2014). Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3(1), 59-64. Retrieve from https://www.ijisc.comPRIPAS, M.I., 2014. Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3(1), 59-64. Available from: https://www.ijisc.comM.I. PRIPAS, "Phishing Attack – Detection and Removal," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 59-64, 2014. Available: https://www.ijisc.comPRIPAS, M.I., 'Phishing Attack – Detection and Removal', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 59-64, (2014).PRIPAS, M.I.: Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3 (2014) 59-64. https://www.ijisc.comPRIPAS, M.I., (2014), Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3: 59-64. https://www.ijisc.com Citation Format :
BASAMAC, L. (2014). Computer Frauds. International Journal of Information Security and Cybercrime, 3(1), 53-58. Retrieve from https://www.ijisc.comBASAMAC, L., 2014. Computer Frauds. International Journal of Information Security and Cybercrime 3(1), 53-58. Available from: https://www.ijisc.comL. BASAMAC, "Computer Frauds," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 53-58, 2014. Available: https://www.ijisc.comBASAMAC, L., 'Computer Frauds', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 53-58, (2014).BASAMAC, L.: Computer Frauds. International Journal of Information Security and Cybercrime 3 (2014) 53-58. https://www.ijisc.comBASAMAC, L., (2014), Computer Frauds. International Journal of Information Security and Cybercrime, 3: 53-58. https://www.ijisc.com Citation Format :
ILIE, R.C. (2013). Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2(1), 9-16. Retrieve from https://www.ijisc.comILIE, R.C., 2013. Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2(1), 9-16. Available from: https://www.ijisc.comR.C. ILIE, "Online Transactions Security in Internet Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 9-16, 2013. Available: https://www.ijisc.comILIE, R.C., 'Online Transactions Security in Internet Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 9-16, (2013).ILIE, R.C.: Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2 (2013) 9-16. https://www.ijisc.comILIE, R.C., (2013), Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2: 9-16. https://www.ijisc.com Citation Format :