IJISC
  • Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the keywords "security"

    Game Changer in Cybersecurity: Quantum Cryptography

    Author(s): VERMA, Amitabh
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2022.02.06
    Pages: 64-71
    AbstractPlus | Quick view | Full article | Citations


    Social Networking Security

    Author(s): DUMITRU, George-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2020.01.03
    Pages: 24-28
    AbstractPlus | Quick view | Full article | Citations


    Cyber Security in Banking Sector

    Author(s): BEST, Michael; KRUMOV, Lachezar; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2019.02.04
    Pages: 39-52
    AbstractPlus | Quick view | Full article | Citations


    Security of Personal Data in Social Networks

    Author(s): VLAD, Ionela-Mariana
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.02.02
    Pages: 14-24
    AbstractPlus | Quick view | Full article | Citations


    Using Embedded Platforms to Monitor Network Security

    Author(s): PASCARIU, Cristian; BARBU, Ionuţ-Daniel; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.02.01
    Pages: 9-13
    AbstractPlus | Quick view | Full article | Citations


    Security in Computer Networks

    Author(s): CERNOV, Ana-Maria
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2018.01.05
    Pages: 45-52
    AbstractPlus | Quick view | Full article | Citations


    Firewall Technologies

    Author(s): VASILE, Cristinel Marius
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2018.01.04
    Pages: 37-44
    AbstractPlus | Quick view | Full article | Citations


    Threats and Risks to Telecommunications Systems

    Author(s): CRĂCIUN, Alexandra Maria
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.01.02
    Pages: 23-31
    AbstractPlus | Quick view | Full article | Citations


    Transaction Security in Online Banking and e-Commerce

    Author(s): ANGHEL, Mihai-Ciprian
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.02.04
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.06
    Pages: 57-62
    AbstractPlus | Quick view | Full article | Citations


    Strategic Management of Critical Infrastructures and Financial Domain

    Author(s): ŞCHEAU, Mircea-Constantin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.01
    Pages: 13-24
    AbstractPlus | Quick view | Full article | Citations


    Malicious Web Pages Detection Using Static Analysis of URLs

    Author(s): PATIL, Dharmaraj R.; PATIL, J. B.
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.02.06
    Pages: 57-70
    AbstractPlus | Quick view | Full article | Citations


    Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking

    Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.01.07
    Pages: 75-80
    AbstractPlus | Quick view | Full article | Citations


    Android and iOS Security – An Analysis and Comparison Report

    Author(s): BHARDWAJ, Akshay; PANDEY, Kailash; CHOPRA, Roopam
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.01.02
    Pages: 32-44
    AbstractPlus | Quick view | Full article | Citations


    A High Secured, Cost Effectively E-Voting System

    Author(s): HAMED, Essam M.; SEDKY, Mohammad Hosam
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.01.01
    Pages: 11-31
    AbstractPlus | Quick view | Full article | Citations


    A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET

    Author(s): SAIED, Jafarian; MEHDI, Sadeghzadeh
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.04
    Pages: 27-32
    AbstractPlus | Quick view | Full article | Citations


    SQL Injection Testing in Web Applications Using SQLmap

    Author(s): AXINTE, Sabina-Daniela
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO

    Author(s): PASĂRE, Alice-Lavinia; CIUCHI, Costel; BOTAN, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Wireless LAN Security Issues (II). Security Assurance

    Author(s): GHERGHINA, Cătălina; PETRICĂ, Gabriel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.01.04
    Pages: 37-46
    AbstractPlus | Quick view | Full article | Citations


    Wireless LAN Security Issues (I). Types of Attacks

    Author(s): GHERGHINA, Cătălina; PETRICĂ, Gabriel
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2013.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations