MAZILU, A.L. (2025). Embedded Systems Security. International Journal of Information Security and Cybercrime, XIV(2), 51-55. Retrieve from https://www.ijisc.comMAZILU, A.L., 2025. Embedded Systems Security. International Journal of Information Security and Cybercrime XIV(2), 51-55. Available from: https://www.ijisc.comA.L. MAZILU, "Embedded Systems Security," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 51-55, 2025. Available: https://www.ijisc.comMAZILU, A.L., 'Embedded Systems Security', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 51-55, (2025).MAZILU, A.L.: Embedded Systems Security. International Journal of Information Security and Cybercrime XIV (2025) 51-55. https://www.ijisc.comMAZILU, A.L., (2025), Embedded Systems Security. International Journal of Information Security and Cybercrime, XIV: 51-55. https://www.ijisc.com Citation Format :
POPESCU, E.E. (2024). VoIP Security Threats. International Journal of Information Security and Cybercrime, 13(1), 66-70. Retrieve from https://www.ijisc.comPOPESCU, E.E., 2024. VoIP Security Threats. International Journal of Information Security and Cybercrime 13(1), 66-70. Available from: https://www.ijisc.comE.E. POPESCU, "VoIP Security Threats," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 66-70, 2024. Available: https://www.ijisc.comPOPESCU, E.E., 'VoIP Security Threats', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 66-70, (2024).POPESCU, E.E.: VoIP Security Threats. International Journal of Information Security and Cybercrime 13 (2024) 66-70. https://www.ijisc.comPOPESCU, E.E., (2024), VoIP Security Threats. International Journal of Information Security and Cybercrime, 13: 66-70. https://www.ijisc.com Citation Format :
COMAN, I.M. (2018). Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime, 7(1), 32-36. Retrieve from https://www.ijisc.comCOMAN, I.M., 2018. Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime 7(1), 32-36. Available from: https://www.ijisc.comI.M. COMAN, "Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 32-36, 2018. Available: https://www.ijisc.comCOMAN, I.M., 'Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 32-36, (2018).COMAN, I.M.: Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime 7 (2018) 32-36. https://www.ijisc.comCOMAN, I.M., (2018), Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime, 7: 32-36. https://www.ijisc.com Citation Format :
MARTIN, I. (2015). Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4(1), 33-40. Retrieve from https://www.ijisc.comMARTIN, I., 2015. Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4(1), 33-40. Available from: https://www.ijisc.comI. MARTIN, "Cyber Security Strategies – an Overview," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 33-40, 2015. Available: https://www.ijisc.comMARTIN, I., 'Cyber Security Strategies – an Overview', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 33-40, (2015).MARTIN, I.: Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4 (2015) 33-40. https://www.ijisc.comMARTIN, I., (2015), Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4: 33-40. https://www.ijisc.com Citation Format :