GRIGORAȘ, A. (2013). The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2(1), 25-34. Retrieve from https://www.ijisc.comGRIGORAȘ, A., 2013. The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2(1), 25-34. Available from: https://www.ijisc.comA. GRIGORAȘ, "The Security of Cloud Networks," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 25-34, 2013. Available: https://www.ijisc.comGRIGORAȘ, A., 'The Security of Cloud Networks', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 25-34, (2013).GRIGORAȘ, A.: The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2 (2013) 25-34. https://www.ijisc.comGRIGORAȘ, A., (2013), The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2: 25-34. https://www.ijisc.com Citation Format :
ISAC, B. (2013). Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2(2), 35-42. Retrieve from https://www.ijisc.comISAC, B., 2013. Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2(2), 35-42. Available from: https://www.ijisc.comB. ISAC, "Issues and Challenges in Cloud Computing Architectures," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 35-42, 2013. Available: https://www.ijisc.comISAC, B., 'Issues and Challenges in Cloud Computing Architectures', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 35-42, (2013).ISAC, B.: Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comISAC, B., (2013), Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
AHUBELE, B.,UGBARI, A., (2022). Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11(1), 31-40. Retrieve from https://www.ijisc.comAHUBELE, B., UGBARI, A., 2022. Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11(1), 31-40. Available from: https://www.ijisc.comB. AHUBELE, A. UGBARI, "Data Protection for Users in Cloud Computing," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 31-40, 2022. Available: https://www.ijisc.comAHUBELE, B., UGBARI, A., 'Data Protection for Users in Cloud Computing', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 31-40, (2022).AHUBELE, B.,UGBARI, A.,: Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11 (2022) 31-40. https://www.ijisc.comAHUBELE, B., UGBARI, A., (2022), Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11: 31-40. https://www.ijisc.com Citation Format :
MIHALACHE, D.N. (2023). Cloud Penetration Testing. International Journal of Information Security and Cybercrime, 12(2), 49-54. Retrieve from https://www.ijisc.comMIHALACHE, D.N., 2023. Cloud Penetration Testing. International Journal of Information Security and Cybercrime 12(2), 49-54. Available from: https://www.ijisc.comD.N. MIHALACHE, "Cloud Penetration Testing," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 49-54, 2023. Available: https://www.ijisc.comMIHALACHE, D.N., 'Cloud Penetration Testing', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 49-54, (2023).MIHALACHE, D.N.: Cloud Penetration Testing. International Journal of Information Security and Cybercrime 12 (2023) 49-54. https://www.ijisc.comMIHALACHE, D.N., (2023), Cloud Penetration Testing. International Journal of Information Security and Cybercrime, 12: 49-54. https://www.ijisc.com Citation Format :