IJISC
  • Indexed in

  • Latest News

    December 24, 2025
    Volume 14, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2025
    Volume 14, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Search results for ""

    Combating Man-in-the-Middle Attacks within IoT Systems

    Author(s): OATU, Laura
    Posted in Volume 13, Issue 1, Year 2024

    Cloud Penetration Testing

    Author(s): MIHALACHE, Denisa-Nicoleta
    Posted in Volume 12, Issue 2, Year 2023

    Data Protection for Users in Cloud Computing

    Author(s): AHUBELE, Betty; UGBARI, Augustine
    Posted in Volume 11, Issue 1, Year 2022

    A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256

    Author(s): CHATTAMVELLI, Rajan
    Posted in Volume 11, Issue 1, Year 2022

    Classification of Information

    Author(s): DUMITRU, Ioan-Alexandru
    Posted in Volume 11, Issue 1, Year 2022

    Vulnerabilities of Information Systems

    Author(s): BRUMĂ, Ovidiu-Vasile
    Posted in Volume 9, Issue 1, Year 2020

    Denial-of-Service Attack

    Author(s): BALABAN, Ioana
    Posted in Volume 10, Issue 1, Year 2021

    Comparative Study of Various Forgery Detection Approach for Image Processing

    Author(s): KUMARI, Manish; SHARMA, Rajesh
    Posted in Volume 10, Issue 1, Year 2021

    Demystifying Secure Graph Database for Analytics of Big Data

    Author(s): MARWAHA, Hitesh; SHARMA, Anurag
    Posted in Volume 10, Issue 1, Year 2021

    Complementary Cybersecurity

    Author(s): POPESCU, Eugen F.
    Posted in Volume 9, Issue 2, Year 2020

    Human-Computer Interaction Considerations When Developing Cyber Ranges

    Author(s): SHEPHERD, Lynsay A.;DE PAOLI, Stefano; CONACHER, Jim
    Posted in Volume 9, Issue 2, Year 2020

    Why Do National Cybersecurity Awareness Programmes Often Fail?

    Author(s): NAGYFEJEO, Eva; SOLMS, Basie Von
    Posted in Volume 9, Issue 2, Year 2020

    Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance

    Author(s): ENNS-BRAY, William S.; ROCHAT, Kim
    Posted in Volume 9, Issue 2, Year 2020

    A Study on Password Strength in Wireless Encryption Protocols

    Author(s): PETRICĂ, Gabriel
    Posted in Volume 8, Issue 2, Year 2019

    Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies

    Author(s): STĂNCIULESCU, Adelaida; BACIVAROV, Ioan
    Posted in Volume 14, Issue 2, Year 2025