SINGH, G.,SHARMA, V., (2021). Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime, 10(1), 38-50. Retrieve from https://www.ijisc.comSINGH, G., SHARMA, V., 2021. Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime 10(1), 38-50. Available from: https://www.ijisc.comG. SINGH, V. SHARMA, "Cyber-Security and Its Future Challenges," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 38-50, 2021. Available: https://www.ijisc.comSINGH, G., SHARMA, V., 'Cyber-Security and Its Future Challenges', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 38-50, (2021).SINGH, G.,SHARMA, V.,: Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime 10 (2021) 38-50. https://www.ijisc.comSINGH, G., SHARMA, V., (2021), Cyber-Security and Its Future Challenges. International Journal of Information Security and Cybercrime, 10: 38-50. https://www.ijisc.com Citation Format :
GEANĂ, I.C. (2012). Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1(2), 17-24. Retrieve from https://www.ijisc.comGEANĂ, I.C., 2012. Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1(2), 17-24. Available from: https://www.ijisc.comI.C. GEANĂ, "Security Solutions for Informatics Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 17-24, 2012. Available: https://www.ijisc.comGEANĂ, I.C., 'Security Solutions for Informatics Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 17-24, (2012).GEANĂ, I.C.: Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1 (2012) 17-24. https://www.ijisc.comGEANĂ, I.C., (2012), Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1: 17-24. https://www.ijisc.com Citation Format :
TRIFAN, M. (2012). Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1(1), 46-54. Retrieve from https://www.ijisc.comTRIFAN, M., 2012. Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1(1), 46-54. Available from: https://www.ijisc.comM. TRIFAN, "Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 46-54, 2012. Available: https://www.ijisc.comTRIFAN, M., 'Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 46-54, (2012).TRIFAN, M.: Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1 (2012) 46-54. https://www.ijisc.comTRIFAN, M., (2012), Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1: 46-54. https://www.ijisc.com Citation Format :