IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the tag "cyber-attacks"

    Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis

    Author(s): TRIFAN, Mihai
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.01.05
    Pages: 46-54
    AbstractPlus | Quick view | Full article | Citations


    Computer Systems Vulnerabilities

    Author(s): BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.01.06
    Pages: 55-65
    AbstractPlus | Quick view | Full article | Citations


    Study on Cyber Attacks over Time and Cybercrime Evolution in Romania

    Author(s): MIHAI, Ioan-Cosmin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2012.01.07
    Pages: 69-78
    AbstractPlus | Quick view | Full article | Citations


    Security Solutions for Informatics Systems

    Author(s): GEANĂ, Ionuţ Cătălin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.02.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations


    Overview on Phishing Attacks

    Author(s): MIHAI, Ioan-Cosmin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2012.02.07
    Pages: 61-67
    AbstractPlus | Quick view | Full article | Citations


    Cybercrime and National Security in the Context of Globalization

    Author(s): CONSTANTIN, Alexandru
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations


    The Components of Cyber-Terrorism

    Author(s): MARCEL, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.01.06
    Pages: 49-58
    AbstractPlus | Quick view | Full article | Citations


    The Concept of Cybercrime and Online Threats Analysis

    Author(s): PARODI, Filippo
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2013.01.07
    Pages: 59-66
    AbstractPlus | Quick view | Full article | Citations


    Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack

    Author(s): GROSU, Vlad-Alexandru
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.02
    Pages: 19-26
    AbstractPlus | Quick view | Full article | Citations


    An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks

    Author(s): MARIN, Răzvan-Ionuț
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.01.05
    Pages: 47-52
    AbstractPlus | Quick view | Full article | Citations


    Phishing Attack – Detection and Removal

    Author(s): PRIPAS, Marian-Iulian
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.01.07
    Pages: 59-64
    AbstractPlus | Quick view | Full article | Citations


    Cyber Kill Chain Analysis

    Author(s): MIHAI, Ioan-Cosmin; PRUNĂ, Ștefan; BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.02.04
    Pages: 37-42
    AbstractPlus | Quick view | Full article | Citations


    SQL Injection Testing in Web Applications Using SQLmap

    Author(s): AXINTE, Sabina-Daniela
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    Strategies for Monitoring Website Security against Cyber-Attacks

    Author(s): MIHAI, Ioan-Cosmin; GENOE, Ray; PRUNĂ, Ștefan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.01
    Pages: 9-14
    AbstractPlus | Quick view | Full article | Citations


    New Challenges for Cybersecurity and Possible Criminal Law

    Author(s): DOBRINOIU, Maxim
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.02
    Pages: 15-21
    AbstractPlus | Quick view | Full article | Citations


    Defense in Depth Principle to Ensure Information Security

    Author(s): BARBU, Ionuț-Daniel; PETRICĂ, Gabriel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.06
    Pages: 41-46
    AbstractPlus | Quick view | Full article | Citations


    Ransomware – an Emerging Threat

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.02.03
    Pages: 27-32
    AbstractPlus | Quick view | Full article | Citations


    Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking

    Author(s): FIDA, Mohsin; JOVITH, A. Arokiaraj
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.01.07
    Pages: 75-80
    AbstractPlus | Quick view | Full article | Citations


    Cyber Espionage Incrimination in Romanian Legislation

    Author(s): MARCOCI, Petrică-Mihail
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2016.02.05
    Pages: 51-56
    AbstractPlus | Quick view | Full article | Citations


    Strategic Management of Critical Infrastructures and Financial Domain

    Author(s): ŞCHEAU, Mircea-Constantin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.01
    Pages: 13-24
    AbstractPlus | Quick view | Full article | Citations