TRIFAN, M. (2012). Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1(1), 46-54. Retrieve from https://www.ijisc.comTRIFAN, M., 2012. Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1(1), 46-54. Available from: https://www.ijisc.comM. TRIFAN, "Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 46-54, 2012. Available: https://www.ijisc.comTRIFAN, M., 'Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 46-54, (2012).TRIFAN, M.: Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1 (2012) 46-54. https://www.ijisc.comTRIFAN, M., (2012), Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1: 46-54. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :
GEANĂ, I.C. (2012). Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1(2), 17-24. Retrieve from https://www.ijisc.comGEANĂ, I.C., 2012. Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1(2), 17-24. Available from: https://www.ijisc.comI.C. GEANĂ, "Security Solutions for Informatics Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 17-24, 2012. Available: https://www.ijisc.comGEANĂ, I.C., 'Security Solutions for Informatics Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 17-24, (2012).GEANĂ, I.C.: Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1 (2012) 17-24. https://www.ijisc.comGEANĂ, I.C., (2012), Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1: 17-24. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1(2), 61-67. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1(2), 61-67. Available from: https://www.ijisc.comI.C. MIHAI, "Overview on Phishing Attacks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 61-67, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Overview on Phishing Attacks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 61-67, (2012).MIHAI, I.C.: Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1 (2012) 61-67. https://www.ijisc.comMIHAI, I.C., (2012), Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1: 61-67. https://www.ijisc.com Citation Format :
CONSTANTIN, A. (2013). Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2(1), 43-48. Retrieve from https://www.ijisc.comCONSTANTIN, A., 2013. Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2(1), 43-48. Available from: https://www.ijisc.comA. CONSTANTIN, "Cybercrime and National Security in the Context of Globalization," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 43-48, 2013. Available: https://www.ijisc.comCONSTANTIN, A., 'Cybercrime and National Security in the Context of Globalization', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 43-48, (2013).CONSTANTIN, A.: Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2 (2013) 43-48. https://www.ijisc.comCONSTANTIN, A., (2013), Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2: 43-48. https://www.ijisc.com Citation Format :
MARCEL, I. (2013). The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime, 2(1), 49-58. Retrieve from https://www.ijisc.comMARCEL, I., 2013. The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime 2(1), 49-58. Available from: https://www.ijisc.comI. MARCEL, "The Components of Cyber-Terrorism," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 49-58, 2013. Available: https://www.ijisc.comMARCEL, I., 'The Components of Cyber-Terrorism', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 49-58, (2013).MARCEL, I.: The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime 2 (2013) 49-58. https://www.ijisc.comMARCEL, I., (2013), The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime, 2: 49-58. https://www.ijisc.com Citation Format :
PARODI, F. (2013). The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2(1), 59-66. Retrieve from https://www.ijisc.comPARODI, F., 2013. The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2(1), 59-66. Available from: https://www.ijisc.comF. PARODI, "The Concept of Cybercrime and Online Threats Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 59-66, 2013. Available: https://www.ijisc.comPARODI, F., 'The Concept of Cybercrime and Online Threats Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 59-66, (2013).PARODI, F.: The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2 (2013) 59-66. https://www.ijisc.comPARODI, F., (2013), The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2: 59-66. https://www.ijisc.com Citation Format :
GROSU, V.A. (2013). Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2(2), 19-26. Retrieve from https://www.ijisc.comGROSU, V.A., 2013. Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2(2), 19-26. Available from: https://www.ijisc.comV.A. GROSU, "Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 19-26, 2013. Available: https://www.ijisc.comGROSU, V.A., 'Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 19-26, (2013).GROSU, V.A.: Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2 (2013) 19-26. https://www.ijisc.comGROSU, V.A., (2013), Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2: 19-26. https://www.ijisc.com Citation Format :
MARIN, R.I. (2014). An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3(1), 47-52. Retrieve from https://www.ijisc.comMARIN, R.I., 2014. An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3(1), 47-52. Available from: https://www.ijisc.comR.I. MARIN, "An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 47-52, 2014. Available: https://www.ijisc.comMARIN, R.I., 'An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 47-52, (2014).MARIN, R.I.: An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3 (2014) 47-52. https://www.ijisc.comMARIN, R.I., (2014), An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3: 47-52. https://www.ijisc.com Citation Format :
PRIPAS, M.I. (2014). Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3(1), 59-64. Retrieve from https://www.ijisc.comPRIPAS, M.I., 2014. Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3(1), 59-64. Available from: https://www.ijisc.comM.I. PRIPAS, "Phishing Attack – Detection and Removal," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 59-64, 2014. Available: https://www.ijisc.comPRIPAS, M.I., 'Phishing Attack – Detection and Removal', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 59-64, (2014).PRIPAS, M.I.: Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3 (2014) 59-64. https://www.ijisc.comPRIPAS, M.I., (2014), Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3: 59-64. https://www.ijisc.com Citation Format :
MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D., (2014). Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3(2), 37-42. Retrieve from https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 2014. Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3(2), 37-42. Available from: https://www.ijisc.comI.C. MIHAI, Ș. PRUNĂ, I.D. BARBU, "Cyber Kill Chain Analysis," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 37-42, 2014. Available: https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 'Cyber Kill Chain Analysis', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 37-42, (2014).MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D.,: Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3 (2014) 37-42. https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., (2014), Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3: 37-42. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2014). SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3(2), 61-68. Retrieve from https://www.ijisc.comAXINTE, S.D., 2014. SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3(2), 61-68. Available from: https://www.ijisc.comS.D. AXINTE, "SQL Injection Testing in Web Applications Using SQLmap," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 61-68, 2014. Available: https://www.ijisc.comAXINTE, S.D., 'SQL Injection Testing in Web Applications Using SQLmap', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 61-68, (2014).AXINTE, S.D.: SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3 (2014) 61-68. https://www.ijisc.comAXINTE, S.D., (2014), SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3: 61-68. https://www.ijisc.com Citation Format :
MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș., (2015). Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4(1), 9-14. Retrieve from https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 2015. Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4(1), 9-14. Available from: https://www.ijisc.comI.C. MIHAI, R. GENOE, Ș. PRUNĂ, "Strategies for Monitoring Website Security against Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 9-14, 2015. Available: https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 'Strategies for Monitoring Website Security against Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 9-14, (2015).MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș.,: Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4 (2015) 9-14. https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., (2015), Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4: 9-14. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2015). New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4(1), 15-21. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2015. New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4(1), 15-21. Available from: https://www.ijisc.comM. DOBRINOIU, "New Challenges for Cybersecurity and Possible Criminal Law," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 15-21, 2015. Available: https://www.ijisc.comDOBRINOIU, M., 'New Challenges for Cybersecurity and Possible Criminal Law', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 15-21, (2015).DOBRINOIU, M.: New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4 (2015) 15-21. https://www.ijisc.comDOBRINOIU, M., (2015), New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4: 15-21. https://www.ijisc.com Citation Format :
BARBU, I.D.,PETRICĂ, G., (2015). Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4(1), 41-46. Retrieve from https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 2015. Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4(1), 41-46. Available from: https://www.ijisc.comI.D. BARBU, G. PETRICĂ, "Defense in Depth Principle to Ensure Information Security," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 41-46, 2015. Available: https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 'Defense in Depth Principle to Ensure Information Security', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 41-46, (2015).BARBU, I.D.,PETRICĂ, G.,: Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4 (2015) 41-46. https://www.ijisc.comBARBU, I.D., PETRICĂ, G., (2015), Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4: 41-46. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D., (2015). Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4(2), 27-32. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., 2015. Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4(2), 27-32. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, "Ransomware – an Emerging Threat," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 27-32, 2015. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., 'Ransomware – an Emerging Threat', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 27-32, (2015).PASCARIU, C.,BARBU, I.D.,: Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comPASCARIU, C., BARBU, I.D., (2015), Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
FIDA, M.,JOVITH, A.A., (2016). Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5(1), 75-80. Retrieve from https://www.ijisc.comFIDA, M., JOVITH, A.A., 2016. Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5(1), 75-80. Available from: https://www.ijisc.comM. FIDA, A.A. JOVITH, "Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 75-80, 2016. Available: https://www.ijisc.comFIDA, M., JOVITH, A.A., 'Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 75-80, (2016).FIDA, M.,JOVITH, A.A.,: Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5 (2016) 75-80. https://www.ijisc.comFIDA, M., JOVITH, A.A., (2016), Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5: 75-80. https://www.ijisc.com Citation Format :
MARCOCI, P.M. (2016). Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime, 5(2), 51-56. Retrieve from https://www.ijisc.comMARCOCI, P.M., 2016. Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime 5(2), 51-56. Available from: https://www.ijisc.comP.M. MARCOCI, "Cyber Espionage Incrimination in Romanian Legislation," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 51-56, 2016. Available: https://www.ijisc.comMARCOCI, P.M., 'Cyber Espionage Incrimination in Romanian Legislation', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 51-56, (2016).MARCOCI, P.M.: Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime 5 (2016) 51-56. https://www.ijisc.comMARCOCI, P.M., (2016), Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime, 5: 51-56. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :