VERMA, A. (2022). Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime, 11(2), 64-71. Retrieve from https://www.ijisc.comVERMA, A., 2022. Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime 11(2), 64-71. Available from: https://www.ijisc.comA. VERMA, "Game Changer in Cybersecurity: Quantum Cryptography," International Journal of Information Security and Cybercrime, vol. 11, no. 2, pp. 64-71, 2022. Available: https://www.ijisc.comVERMA, A., 'Game Changer in Cybersecurity: Quantum Cryptography', International Journal of Information Security and Cybercrime, vol. 11, no. 2, 64-71, (2022).VERMA, A.: Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime 11 (2022) 64-71. https://www.ijisc.comVERMA, A., (2022), Game Changer in Cybersecurity: Quantum Cryptography. International Journal of Information Security and Cybercrime, 11: 64-71. https://www.ijisc.com Citation Format :
DUMITRU, G.D. (2020). Social Networking Security. International Journal of Information Security and Cybercrime, 9(1), 24-28. Retrieve from https://www.ijisc.comDUMITRU, G.D., 2020. Social Networking Security. International Journal of Information Security and Cybercrime 9(1), 24-28. Available from: https://www.ijisc.comG.D. DUMITRU, "Social Networking Security," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 24-28, 2020. Available: https://www.ijisc.comDUMITRU, G.D., 'Social Networking Security', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 24-28, (2020).DUMITRU, G.D.: Social Networking Security. International Journal of Information Security and Cybercrime 9 (2020) 24-28. https://www.ijisc.comDUMITRU, G.D., (2020), Social Networking Security. International Journal of Information Security and Cybercrime, 9: 24-28. https://www.ijisc.com Citation Format :
BEST, M.,KRUMOV, L.,BACIVAROV, I., (2019). Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8(2), 39-52. Retrieve from https://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 2019. Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8(2), 39-52. Available from: https://www.ijisc.comM. BEST, L. KRUMOV, I. BACIVAROV, "Cyber Security in Banking Sector," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 39-52, 2019. Available: https://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 'Cyber Security in Banking Sector', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 39-52, (2019).BEST, M.,KRUMOV, L.,BACIVAROV, I.,: Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8 (2019) 39-52. https://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., (2019), Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8: 39-52. https://www.ijisc.com Citation Format :
VLAD, I.M. (2018). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7(2), 14-24. Retrieve from https://www.ijisc.comVLAD, I.M., 2018. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7(2), 14-24. Available from: https://www.ijisc.comI.M. VLAD, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 14-24, 2018. Available: https://www.ijisc.comVLAD, I.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 14-24, (2018).VLAD, I.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7 (2018) 14-24. https://www.ijisc.comVLAD, I.M., (2018), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7: 14-24. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2018). Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7(2), 9-13. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2018. Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7(2), 9-13. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Using Embedded Platforms to Monitor Network Security," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 9-13, 2018. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Using Embedded Platforms to Monitor Network Security', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 9-13, (2018).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7 (2018) 9-13. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2018), Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7: 9-13. https://www.ijisc.com Citation Format :
CERNOV, A.M. (2018). Security in Computer Networks. International Journal of Information Security and Cybercrime, 7(1), 45-52. Retrieve from https://www.ijisc.comCERNOV, A.M., 2018. Security in Computer Networks. International Journal of Information Security and Cybercrime 7(1), 45-52. Available from: https://www.ijisc.comA.M. CERNOV, "Security in Computer Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 45-52, 2018. Available: https://www.ijisc.comCERNOV, A.M., 'Security in Computer Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 45-52, (2018).CERNOV, A.M.: Security in Computer Networks. International Journal of Information Security and Cybercrime 7 (2018) 45-52. https://www.ijisc.comCERNOV, A.M., (2018), Security in Computer Networks. International Journal of Information Security and Cybercrime, 7: 45-52. https://www.ijisc.com Citation Format :
VASILE, C.M. (2018). Firewall Technologies. International Journal of Information Security and Cybercrime, 7(1), 37-44. Retrieve from https://www.ijisc.comVASILE, C.M., 2018. Firewall Technologies. International Journal of Information Security and Cybercrime 7(1), 37-44. Available from: https://www.ijisc.comC.M. VASILE, "Firewall Technologies," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 37-44, 2018. Available: https://www.ijisc.comVASILE, C.M., 'Firewall Technologies', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 37-44, (2018).VASILE, C.M.: Firewall Technologies. International Journal of Information Security and Cybercrime 7 (2018) 37-44. https://www.ijisc.comVASILE, C.M., (2018), Firewall Technologies. International Journal of Information Security and Cybercrime, 7: 37-44. https://www.ijisc.com Citation Format :
CRĂCIUN, A.M. (2018). Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7(1), 23-31. Retrieve from https://www.ijisc.comCRĂCIUN, A.M., 2018. Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7(1), 23-31. Available from: https://www.ijisc.comA.M. CRĂCIUN, "Threats and Risks to Telecommunications Systems," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 23-31, 2018. Available: https://www.ijisc.comCRĂCIUN, A.M., 'Threats and Risks to Telecommunications Systems', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 23-31, (2018).CRĂCIUN, A.M.: Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7 (2018) 23-31. https://www.ijisc.comCRĂCIUN, A.M., (2018), Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7: 23-31. https://www.ijisc.com Citation Format :
ANGHEL, M.C. (2017). Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime, 6(2), 27-34. Retrieve from https://www.ijisc.comANGHEL, M.C., 2017. Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime 6(2), 27-34. Available from: https://www.ijisc.comM.C. ANGHEL, "Transaction Security in Online Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 27-34, 2017. Available: https://www.ijisc.comANGHEL, M.C., 'Transaction Security in Online Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 27-34, (2017).ANGHEL, M.C.: Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime 6 (2017) 27-34. https://www.ijisc.comANGHEL, M.C., (2017), Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime, 6: 27-34. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :
PATIL, D.R.,PATIL, J.B., (2016). Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5(2), 57-70. Retrieve from https://www.ijisc.comPATIL, D.R., PATIL, J.B., 2016. Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5(2), 57-70. Available from: https://www.ijisc.comD.R. PATIL, J.B. PATIL, "Malicious Web Pages Detection Using Static Analysis of URLs," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 57-70, 2016. Available: https://www.ijisc.comPATIL, D.R., PATIL, J.B., 'Malicious Web Pages Detection Using Static Analysis of URLs', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 57-70, (2016).PATIL, D.R.,PATIL, J.B.,: Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5 (2016) 57-70. https://www.ijisc.comPATIL, D.R., PATIL, J.B., (2016), Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5: 57-70. https://www.ijisc.com Citation Format :
FIDA, M.,JOVITH, A.A., (2016). Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5(1), 75-80. Retrieve from https://www.ijisc.comFIDA, M., JOVITH, A.A., 2016. Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5(1), 75-80. Available from: https://www.ijisc.comM. FIDA, A.A. JOVITH, "Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 75-80, 2016. Available: https://www.ijisc.comFIDA, M., JOVITH, A.A., 'Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 75-80, (2016).FIDA, M.,JOVITH, A.A.,: Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5 (2016) 75-80. https://www.ijisc.comFIDA, M., JOVITH, A.A., (2016), Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5: 75-80. https://www.ijisc.com Citation Format :
BHARDWAJ, A.,PANDEY, K.,CHOPRA, R., (2016). Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime, 5(1), 32-44. Retrieve from https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., 2016. Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime 5(1), 32-44. Available from: https://www.ijisc.comA. BHARDWAJ, K. PANDEY, R. CHOPRA, "Android and iOS Security – An Analysis and Comparison Report," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 32-44, 2016. Available: https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., 'Android and iOS Security – An Analysis and Comparison Report', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 32-44, (2016).BHARDWAJ, A.,PANDEY, K.,CHOPRA, R.,: Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime 5 (2016) 32-44. https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., (2016), Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime, 5: 32-44. https://www.ijisc.com Citation Format :
HAMED, E.M.,SEDKY, M.H., (2016). A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime, 5(1), 11-31. Retrieve from https://www.ijisc.comHAMED, E.M., SEDKY, M.H., 2016. A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime 5(1), 11-31. Available from: https://www.ijisc.comE.M. HAMED, M.H. SEDKY, "A High Secured, Cost Effectively E-Voting System," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 11-31, 2016. Available: https://www.ijisc.comHAMED, E.M., SEDKY, M.H., 'A High Secured, Cost Effectively E-Voting System', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 11-31, (2016).HAMED, E.M.,SEDKY, M.H.,: A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime 5 (2016) 11-31. https://www.ijisc.comHAMED, E.M., SEDKY, M.H., (2016), A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime, 5: 11-31. https://www.ijisc.com Citation Format :
SAIED, J.,MEHDI, S., (2015). A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime, 4(1), 27-32. Retrieve from https://www.ijisc.comSAIED, J., MEHDI, S., 2015. A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime 4(1), 27-32. Available from: https://www.ijisc.comJ. SAIED, S. MEHDI, "A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 27-32, 2015. Available: https://www.ijisc.comSAIED, J., MEHDI, S., 'A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 27-32, (2015).SAIED, J.,MEHDI, S.,: A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comSAIED, J., MEHDI, S., (2015), A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2014). SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3(2), 61-68. Retrieve from https://www.ijisc.comAXINTE, S.D., 2014. SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3(2), 61-68. Available from: https://www.ijisc.comS.D. AXINTE, "SQL Injection Testing in Web Applications Using SQLmap," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 61-68, 2014. Available: https://www.ijisc.comAXINTE, S.D., 'SQL Injection Testing in Web Applications Using SQLmap', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 61-68, (2014).AXINTE, S.D.: SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3 (2014) 61-68. https://www.ijisc.comAXINTE, S.D., (2014), SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3: 61-68. https://www.ijisc.com Citation Format :
PASĂRE, A.L.,CIUCHI, C.,BOTAN, C., (2014). A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3(2), 7-18. Retrieve from https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 2014. A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3(2), 7-18. Available from: https://www.ijisc.comA.L. PASĂRE, C. CIUCHI, C. BOTAN, "A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 7-18, 2014. Available: https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 'A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 7-18, (2014).PASĂRE, A.L.,CIUCHI, C.,BOTAN, C.,: A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3 (2014) 7-18. https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., (2014), A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3: 7-18. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2014). Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3(1), 37-46. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2014. Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3(1), 37-46. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (II). Security Assurance," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 37-46, 2014. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (II). Security Assurance', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 37-46, (2014).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3 (2014) 37-46. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2014), Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3: 37-46. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2013). Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2(2), 61-68. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2013. Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2(2), 61-68. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (I). Types of Attacks," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 61-68, 2013. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (I). Types of Attacks', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 61-68, (2013).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2 (2013) 61-68. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2013), Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2: 61-68. https://www.ijisc.com Citation Format :