VLAD, I.M. (2018). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7(2), 14-24. Retrieve from https://www.ijisc.comVLAD, I.M., 2018. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7(2), 14-24. Available from: https://www.ijisc.comI.M. VLAD, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 14-24, 2018. Available: https://www.ijisc.comVLAD, I.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 14-24, (2018).VLAD, I.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7 (2018) 14-24. https://www.ijisc.comVLAD, I.M., (2018), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7: 14-24. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2014). SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3(2), 61-68. Retrieve from https://www.ijisc.comAXINTE, S.D., 2014. SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3(2), 61-68. Available from: https://www.ijisc.comS.D. AXINTE, "SQL Injection Testing in Web Applications Using SQLmap," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 61-68, 2014. Available: https://www.ijisc.comAXINTE, S.D., 'SQL Injection Testing in Web Applications Using SQLmap', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 61-68, (2014).AXINTE, S.D.: SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3 (2014) 61-68. https://www.ijisc.comAXINTE, S.D., (2014), SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3: 61-68. https://www.ijisc.com Citation Format :
BARBU, I.D.,BACIVAROV, I., (2014). Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3(2), 49-60. Retrieve from https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 2014. Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3(2), 49-60. Available from: https://www.ijisc.comI.D. BARBU, I. BACIVAROV, "Heartbleed – The Vulnerability That Changed the Internet," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 49-60, 2014. Available: https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 'Heartbleed – The Vulnerability That Changed the Internet', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 49-60, (2014).BARBU, I.D.,BACIVAROV, I.,: Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3 (2014) 49-60. https://www.ijisc.comBARBU, I.D., BACIVAROV, I., (2014), Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3: 49-60. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2014). Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3(1), 37-46. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2014. Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3(1), 37-46. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (II). Security Assurance," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 37-46, 2014. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (II). Security Assurance', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 37-46, (2014).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3 (2014) 37-46. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2014), Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3: 37-46. https://www.ijisc.com Citation Format :
GHERGHINA, C. (2012). Cyberterrorism. International Journal of Information Security and Cybercrime, 1(2), 33-39. Retrieve from https://www.ijisc.comGHERGHINA, C., 2012. Cyberterrorism. International Journal of Information Security and Cybercrime 1(2), 33-39. Available from: https://www.ijisc.comC. GHERGHINA, "Cyberterrorism," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 33-39, 2012. Available: https://www.ijisc.comGHERGHINA, C., 'Cyberterrorism', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 33-39, (2012).GHERGHINA, C.: Cyberterrorism. International Journal of Information Security and Cybercrime 1 (2012) 33-39. https://www.ijisc.comGHERGHINA, C., (2012), Cyberterrorism. International Journal of Information Security and Cybercrime, 1: 33-39. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :