IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the keywords "security"

    Security of Personal Data in Social Networks

    Author(s): VLAD, Ionela-Mariana
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.02.02
    Pages: 14-24
    AbstractPlus | Quick view | Full article | Citations


    Using Embedded Platforms to Monitor Network Security

    Author(s): PASCARIU, Cristian; BARBU, Ionuţ-Daniel; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.02.01
    Pages: 9-13
    AbstractPlus | Quick view | Full article | Citations


    Security in Computer Networks

    Author(s): CERNOV, Ana-Maria
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2018.01.05
    Pages: 45-52
    AbstractPlus | Quick view | Full article | Citations


    Firewall Technologies

    Author(s): VASILE, Cristinel Marius
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2018.01.04
    Pages: 37-44
    AbstractPlus | Quick view | Full article | Citations


    Threats and Risks to Telecommunications Systems

    Author(s): CRĂCIUN, Alexandra Maria
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.01.02
    Pages: 23-31
    AbstractPlus | Quick view | Full article | Citations


    Transaction Security in Online Banking and e-Commerce

    Author(s): ANGHEL, Mihai-Ciprian
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.02.04
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.06
    Pages: 57-62
    AbstractPlus | Quick view | Full article | Citations


    Strategic Management of Critical Infrastructures and Financial Domain

    Author(s): ŞCHEAU, Mircea-Constantin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.01
    Pages: 13-24
    AbstractPlus | Quick view | Full article | Citations


    Malicious Web Pages Detection Using Static Analysis of URLs

    Author(s): PATIL, Dharmaraj R.; PATIL, J. B.
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.02.06
    Pages: 57-70
    AbstractPlus | Quick view | Full article | Citations


    Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking

    Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.01.07
    Pages: 75-80
    AbstractPlus | Quick view | Full article | Citations


    Android and iOS Security – An Analysis and Comparison Report

    Author(s): BHARDWAJ, Akshay; PANDEY, Kailash; CHOPRA, Roopam
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.01.02
    Pages: 32-44
    AbstractPlus | Quick view | Full article | Citations


    A High Secured, Cost Effectively E-Voting System

    Author(s): HAMED, Essam M.; SEDKY, Mohammad Hosam
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.01.01
    Pages: 11-31
    AbstractPlus | Quick view | Full article | Citations


    A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET

    Author(s): SAIED, Jafarian; MEHDI, Sadeghzadeh
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.04
    Pages: 27-32
    AbstractPlus | Quick view | Full article | Citations


    SQL Injection Testing in Web Applications Using SQLmap

    Author(s): AXINTE, Sabina-Daniela
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO

    Author(s): PASĂRE, Alice-Lavinia; CIUCHI, Costel; BOTAN, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Wireless LAN Security Issues (II). Security Assurance

    Author(s): GHERGHINA, Cătălina; PETRICĂ, Gabriel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.01.04
    Pages: 37-46
    AbstractPlus | Quick view | Full article | Citations


    Wireless LAN Security Issues (I). Types of Attacks

    Author(s): GHERGHINA, Cătălina; PETRICĂ, Gabriel
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2013.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    Legislative Aspects of Cybersecurity

    Author(s): PEȚA, Cezar
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.06
    Pages: 55-60
    AbstractPlus | Quick view | Full article | Citations


    Encryption in Mobile Communications. ZUC Algorithm.

    Author(s): IANCU, Laura; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Cybercrime and National Security in the Context of Globalization

    Author(s): CONSTANTIN, Alexandru
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations