STOICA, I.T. (2024). The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13(1), 49-58. Retrieve from https://www.ijisc.comSTOICA, I.T., 2024. The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13(1), 49-58. Available from: https://www.ijisc.comI.T. STOICA, "The Future Risk of Biometric Data Theft in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 49-58, 2024. Available: https://www.ijisc.comSTOICA, I.T., 'The Future Risk of Biometric Data Theft in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 49-58, (2024).STOICA, I.T.: The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime 13 (2024) 49-58. https://www.ijisc.comSTOICA, I.T., (2024), The Future Risk of Biometric Data Theft in Cybersecurity. International Journal of Information Security and Cybercrime, 13: 49-58. https://www.ijisc.com Citation Format :
HUMIED, I.A. (2022). Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11(2), 35-44. Retrieve from https://www.ijisc.comHUMIED, I.A., 2022. Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11(2), 35-44. Available from: https://www.ijisc.comI.A. HUMIED, "Cybersecurity as Emerging Challenge to Yemen Security," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 35-44, 2022. Available: https://www.ijisc.comHUMIED, I.A., 'Cybersecurity as Emerging Challenge to Yemen Security', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 35-44, (2022).HUMIED, I.A.: Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime 11 (2022) 35-44. https://www.ijisc.comHUMIED, I.A., (2022), Cybersecurity as Emerging Challenge to Yemen Security. International Journal of Information Security and Cybercrime, 11: 35-44. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :
ISAC, B. (2013). Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2(2), 35-42. Retrieve from https://www.ijisc.comISAC, B., 2013. Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2(2), 35-42. Available from: https://www.ijisc.comB. ISAC, "Issues and Challenges in Cloud Computing Architectures," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 35-42, 2013. Available: https://www.ijisc.comISAC, B., 'Issues and Challenges in Cloud Computing Architectures', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 35-42, (2013).ISAC, B.: Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comISAC, B., (2013), Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :