IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the tag "cyber-attacks"

    Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis

    Author(s): TRIFAN, Mihai
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.01.05
    Pages: 46-54
    AbstractPlus | Quick view | Full article | Citations


    Computer Systems Vulnerabilities

    Author(s): BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.01.06
    Pages: 55-65
    AbstractPlus | Quick view | Full article | Citations


    Study on Cyber Attacks over Time and Cybercrime Evolution in Romania

    Author(s): MIHAI, Ioan-Cosmin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2012.01.07
    Pages: 69-78
    AbstractPlus | Quick view | Full article | Citations


    Security Solutions for Informatics Systems

    Author(s): GEANĂ, Ionuţ Cătălin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.02.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations


    Overview on Phishing Attacks

    Author(s): MIHAI, Ioan-Cosmin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2012.02.07
    Pages: 61-67
    AbstractPlus | Quick view | Full article | Citations


    Cybercrime and National Security in the Context of Globalization

    Author(s): CONSTANTIN, Alexandru
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations


    The Components of Cyber-Terrorism

    Author(s): MARCEL, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.06
    Pages: 49-58
    AbstractPlus | Quick view | Full article | Citations


    The Concept of Cybercrime and Online Threats Analysis

    Author(s): PARODI, Filippo
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2013.01.07
    Pages: 59-66
    AbstractPlus | Quick view | Full article | Citations


    Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack

    Author(s): GROSU, Vlad-Alexandru
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.02
    Pages: 19-26
    AbstractPlus | Quick view | Full article | Citations


    An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks

    Author(s): MARIN, Răzvan-Ionuț
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.01.05
    Pages: 47-52
    AbstractPlus | Quick view | Full article | Citations


    Phishing Attack – Detection and Removal

    Author(s): PRIPAS, Marian-Iulian
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.01.07
    Pages: 59-64
    AbstractPlus | Quick view | Full article | Citations


    Cyber Kill Chain Analysis

    Author(s): MIHAI, Ioan-Cosmin; PRUNĂ, Ștefan; BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.02.04
    Pages: 37-42
    AbstractPlus | Quick view | Full article | Citations


    SQL Injection Testing in Web Applications Using SQLmap

    Author(s): AXINTE, Sabina-Daniela
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    Strategies for Monitoring Website Security against Cyber-Attacks

    Author(s): MIHAI, Ioan-Cosmin; GENOE, Ray; PRUNĂ, Ștefan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.01
    Pages: 9-14
    AbstractPlus | Quick view | Full article | Citations


    New Challenges for Cybersecurity and Possible Criminal Law

    Author(s): DOBRINOIU, Maxim
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.02
    Pages: 15-21
    AbstractPlus | Quick view | Full article | Citations


    Defense in Depth Principle to Ensure Information Security

    Author(s): BARBU, Ionuț-Daniel; PETRICĂ, Gabriel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.06
    Pages: 41-46
    AbstractPlus | Quick view | Full article | Citations


    Ransomware – an Emerging Threat

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.02.03
    Pages: 27-32
    AbstractPlus | Quick view | Full article | Citations


    Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking

    Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.01.07
    Pages: 75-80
    AbstractPlus | Quick view | Full article | Citations


    Cyber Espionage Incrimination in Romanian Legislation

    Author(s): MARCOCI, Petrică-Mihail
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2016.02.05
    Pages: 51-56
    AbstractPlus | Quick view | Full article | Citations


    Strategic Management of Critical Infrastructures and Financial Domain

    Author(s): ŞCHEAU, Mircea-Constantin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.01
    Pages: 13-24
    AbstractPlus | Quick view | Full article | Citations