MĂCSINOIU, V.E. (2024). Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime, 13(2), 59-64. Retrieve from https://www.ijisc.comMĂCSINOIU, V.E., 2024. Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime 13(2), 59-64. Available from: https://www.ijisc.comV.E. MĂCSINOIU, "Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 59-64, 2024. Available: https://www.ijisc.comMĂCSINOIU, V.E., 'Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 59-64, (2024).MĂCSINOIU, V.E.: Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime 13 (2024) 59-64. https://www.ijisc.comMĂCSINOIU, V.E., (2024), Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime, 13: 59-64. https://www.ijisc.com Citation Format :
BURDESCU, A.M. (2021). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 10(1), 51-58. Retrieve from https://www.ijisc.comBURDESCU, A.M., 2021. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 10(1), 51-58. Available from: https://www.ijisc.comA.M. BURDESCU, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 51-58, 2021. Available: https://www.ijisc.comBURDESCU, A.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 51-58, (2021).BURDESCU, A.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 10 (2021) 51-58. https://www.ijisc.comBURDESCU, A.M., (2021), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 10: 51-58. https://www.ijisc.com Citation Format :
CAMPEAN, S. (2019). The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime, 8(1), 51-58. Retrieve from https://www.ijisc.comCAMPEAN, S., 2019. The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime 8(1), 51-58. Available from: https://www.ijisc.comS. CAMPEAN, "The Human Factor at the Center of a Cyber Security Culture," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 51-58, 2019. Available: https://www.ijisc.comCAMPEAN, S., 'The Human Factor at the Center of a Cyber Security Culture', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 51-58, (2019).CAMPEAN, S.: The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime 8 (2019) 51-58. https://www.ijisc.comCAMPEAN, S., (2019), The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime, 8: 51-58. https://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: https://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. https://www.ijisc.com Citation Format :
COSTEA, I. (2012). Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1(2), 40-47. Retrieve from https://www.ijisc.comCOSTEA, I., 2012. Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1(2), 40-47. Available from: https://www.ijisc.comI. COSTEA, "Data Privacy Assurance in Virtual Private Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 40-47, 2012. Available: https://www.ijisc.comCOSTEA, I., 'Data Privacy Assurance in Virtual Private Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 40-47, (2012).COSTEA, I.: Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1 (2012) 40-47. https://www.ijisc.comCOSTEA, I., (2012), Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1: 40-47. https://www.ijisc.com Citation Format :