BRUMĂ, O.V. (2020). Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime, 9(1), 9-14. Retrieve from https://www.ijisc.comBRUMĂ, O.V., 2020. Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime 9(1), 9-14. Available from: https://www.ijisc.comO.V. BRUMĂ, "Vulnerabilities of Information Systems," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 9-14, 2020. Available: https://www.ijisc.comBRUMĂ, O.V., 'Vulnerabilities of Information Systems', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 9-14, (2020).BRUMĂ, O.V.: Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime 9 (2020) 9-14. https://www.ijisc.comBRUMĂ, O.V., (2020), Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime, 9: 9-14. https://www.ijisc.com Citation Format :
POPESCU, I. (2018). The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7(2), 25-32. Retrieve from https://www.ijisc.comPOPESCU, I., 2018. The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7(2), 25-32. Available from: https://www.ijisc.comI. POPESCU, "The Influence of Vulnerabilities on the Information Systems and Methods of Prevention," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 25-32, 2018. Available: https://www.ijisc.comPOPESCU, I., 'The Influence of Vulnerabilities on the Information Systems and Methods of Prevention', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 25-32, (2018).POPESCU, I.: The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7 (2018) 25-32. https://www.ijisc.comPOPESCU, I., (2018), The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7: 25-32. https://www.ijisc.com Citation Format :
CRĂCIUN, A.M. (2018). Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7(1), 23-31. Retrieve from https://www.ijisc.comCRĂCIUN, A.M., 2018. Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7(1), 23-31. Available from: https://www.ijisc.comA.M. CRĂCIUN, "Threats and Risks to Telecommunications Systems," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 23-31, 2018. Available: https://www.ijisc.comCRĂCIUN, A.M., 'Threats and Risks to Telecommunications Systems', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 23-31, (2018).CRĂCIUN, A.M.: Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7 (2018) 23-31. https://www.ijisc.comCRĂCIUN, A.M., (2018), Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7: 23-31. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :
BEŞLIU, D.C. (2017). Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6(2), 35-39. Retrieve from https://www.ijisc.comBEŞLIU, D.C., 2017. Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6(2), 35-39. Available from: https://www.ijisc.comD.C. BEŞLIU, "Cyber Terrorism – A Growing Threat in the Field of Cyber Security," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 35-39, 2017. Available: https://www.ijisc.comBEŞLIU, D.C., 'Cyber Terrorism – A Growing Threat in the Field of Cyber Security', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 35-39, (2017).BEŞLIU, D.C.: Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6 (2017) 35-39. https://www.ijisc.comBEŞLIU, D.C., (2017), Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6: 35-39. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G., (2015). Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4(2), 73-85. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 2015. Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4(2), 73-85. Available from: https://www.ijisc.comM.C. ŞCHEAU, L. ARSENE, G. DINCĂ, "Infection Vectors – Risk Factors for Financial Transactions," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 73-85, 2015. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 'Infection Vectors – Risk Factors for Financial Transactions', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 73-85, (2015).ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G.,: Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4 (2015) 73-85. https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., (2015), Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4: 73-85. https://www.ijisc.com Citation Format :