AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A., (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8(2), 9-20. Retrieve from https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 2019. Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8(2), 9-20. Available from: https://www.ijisc.comA. AJIBOLA, I. UJATA, O. ADELAIYE, N.A. RAHMAN, "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 9-20, 2019. Available: https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 'Mitigating Advanced Persistent Threats: A Comparative Evaluation Review', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 9-20, (2019).AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A.,: Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8 (2019) 9-20. https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., (2019), Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8: 9-20. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2016). Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5(2), 9-16. Retrieve from https://www.ijisc.comAXINTE, S.D., 2016. Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5(2), 9-16. Available from: https://www.ijisc.comS.D. AXINTE, "Security Challenges for Software Development Companies," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 9-16, 2016. Available: https://www.ijisc.comAXINTE, S.D., 'Security Challenges for Software Development Companies', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 9-16, (2016).AXINTE, S.D.: Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5 (2016) 9-16. https://www.ijisc.comAXINTE, S.D., (2016), Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5: 9-16. https://www.ijisc.com Citation Format :