GHERGHINA, C.,PETRICĂ, G., (2013). Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2(2), 61-68. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2013. Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2(2), 61-68. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (I). Types of Attacks," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 61-68, 2013. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (I). Types of Attacks', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 61-68, (2013).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2 (2013) 61-68. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2013), Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2: 61-68. https://www.ijisc.com Citation Format :
PEȚA, C. (2013). Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2(2), 55-60. Retrieve from https://www.ijisc.comPEȚA, C., 2013. Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2(2), 55-60. Available from: https://www.ijisc.comC. PEȚA, "Legislative Aspects of Cybersecurity," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 55-60, 2013. Available: https://www.ijisc.comPEȚA, C., 'Legislative Aspects of Cybersecurity', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 55-60, (2013).PEȚA, C.: Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2 (2013) 55-60. https://www.ijisc.comPEȚA, C., (2013), Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2: 55-60. https://www.ijisc.com Citation Format :
IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from https://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: https://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: https://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. https://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. https://www.ijisc.com Citation Format :
CONSTANTIN, A. (2013). Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2(1), 43-48. Retrieve from https://www.ijisc.comCONSTANTIN, A., 2013. Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2(1), 43-48. Available from: https://www.ijisc.comA. CONSTANTIN, "Cybercrime and National Security in the Context of Globalization," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 43-48, 2013. Available: https://www.ijisc.comCONSTANTIN, A., 'Cybercrime and National Security in the Context of Globalization', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 43-48, (2013).CONSTANTIN, A.: Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2 (2013) 43-48. https://www.ijisc.comCONSTANTIN, A., (2013), Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2: 43-48. https://www.ijisc.com Citation Format :
GRIGORAȘ, A. (2013). The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2(1), 25-34. Retrieve from https://www.ijisc.comGRIGORAȘ, A., 2013. The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2(1), 25-34. Available from: https://www.ijisc.comA. GRIGORAȘ, "The Security of Cloud Networks," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 25-34, 2013. Available: https://www.ijisc.comGRIGORAȘ, A., 'The Security of Cloud Networks', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 25-34, (2013).GRIGORAȘ, A.: The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2 (2013) 25-34. https://www.ijisc.comGRIGORAȘ, A., (2013), The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2: 25-34. https://www.ijisc.com Citation Format :
SEREȚEANU, A. (2013). Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2(1), 17-24. Retrieve from https://www.ijisc.comSEREȚEANU, A., 2013. Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2(1), 17-24. Available from: https://www.ijisc.comA. SEREȚEANU, "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 17-24, 2013. Available: https://www.ijisc.comSEREȚEANU, A., 'Security in Most Recent Generation of Mobile Telecommunication Networks – LTE', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 17-24, (2013).SEREȚEANU, A.: Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2 (2013) 17-24. https://www.ijisc.comSEREȚEANU, A., (2013), Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2: 17-24. https://www.ijisc.com Citation Format :
IANCU, L. (2012). An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1(2), 48-57. Retrieve from https://www.ijisc.comIANCU, L., 2012. An Overview of LTE Security. International Journal of Information Security and Cybercrime 1(2), 48-57. Available from: https://www.ijisc.comL. IANCU, "An Overview of LTE Security," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 48-57, 2012. Available: https://www.ijisc.comIANCU, L., 'An Overview of LTE Security', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 48-57, (2012).IANCU, L.: An Overview of LTE Security. International Journal of Information Security and Cybercrime 1 (2012) 48-57. https://www.ijisc.comIANCU, L., (2012), An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1: 48-57. https://www.ijisc.com Citation Format :
COSTEA, I. (2012). Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1(2), 40-47. Retrieve from https://www.ijisc.comCOSTEA, I., 2012. Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1(2), 40-47. Available from: https://www.ijisc.comI. COSTEA, "Data Privacy Assurance in Virtual Private Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 40-47, 2012. Available: https://www.ijisc.comCOSTEA, I., 'Data Privacy Assurance in Virtual Private Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 40-47, (2012).COSTEA, I.: Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1 (2012) 40-47. https://www.ijisc.comCOSTEA, I., (2012), Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1: 40-47. https://www.ijisc.com Citation Format :
GEANĂ, I.C. (2012). Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1(2), 17-24. Retrieve from https://www.ijisc.comGEANĂ, I.C., 2012. Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1(2), 17-24. Available from: https://www.ijisc.comI.C. GEANĂ, "Security Solutions for Informatics Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 17-24, 2012. Available: https://www.ijisc.comGEANĂ, I.C., 'Security Solutions for Informatics Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 17-24, (2012).GEANĂ, I.C.: Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1 (2012) 17-24. https://www.ijisc.comGEANĂ, I.C., (2012), Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1: 17-24. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :