PETRICĂ, G. (2019). A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8(2), 21-26. Retrieve from https://www.ijisc.comPETRICĂ, G., 2019. A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8(2), 21-26. Available from: https://www.ijisc.comG. PETRICĂ, "A Study on Password Strength in Wireless Encryption Protocols," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 21-26, 2019. Available: https://www.ijisc.comPETRICĂ, G., 'A Study on Password Strength in Wireless Encryption Protocols', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 21-26, (2019).PETRICĂ, G.: A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8 (2019) 21-26. https://www.ijisc.comPETRICĂ, G., (2019), A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8: 21-26. https://www.ijisc.com Citation Format :
MARWAHA, H.,SHARMA, A., (2021). Demystifying Secure Graph Database for Analytics of Big Data. International Journal of Information Security and Cybercrime, 10(1), 11-17. Retrieve from https://www.ijisc.comMARWAHA, H., SHARMA, A., 2021. Demystifying Secure Graph Database for Analytics of Big Data. International Journal of Information Security and Cybercrime 10(1), 11-17. Available from: https://www.ijisc.comH. MARWAHA, A. SHARMA, "Demystifying Secure Graph Database for Analytics of Big Data," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 11-17, 2021. Available: https://www.ijisc.comMARWAHA, H., SHARMA, A., 'Demystifying Secure Graph Database for Analytics of Big Data', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 11-17, (2021).MARWAHA, H.,SHARMA, A.,: Demystifying Secure Graph Database for Analytics of Big Data. International Journal of Information Security and Cybercrime 10 (2021) 11-17. https://www.ijisc.comMARWAHA, H., SHARMA, A., (2021), Demystifying Secure Graph Database for Analytics of Big Data. International Journal of Information Security and Cybercrime, 10: 11-17. https://www.ijisc.com Citation Format :
KUMARI, M.,SHARMA, R., (2021). Comparative Study of Various Forgery Detection Approach for Image Processing. International Journal of Information Security and Cybercrime, 10(1), 18-26. Retrieve from https://www.ijisc.comKUMARI, M., SHARMA, R., 2021. Comparative Study of Various Forgery Detection Approach for Image Processing. International Journal of Information Security and Cybercrime 10(1), 18-26. Available from: https://www.ijisc.comM. KUMARI, R. SHARMA, "Comparative Study of Various Forgery Detection Approach for Image Processing," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 18-26, 2021. Available: https://www.ijisc.comKUMARI, M., SHARMA, R., 'Comparative Study of Various Forgery Detection Approach for Image Processing', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 18-26, (2021).KUMARI, M.,SHARMA, R.,: Comparative Study of Various Forgery Detection Approach for Image Processing. International Journal of Information Security and Cybercrime 10 (2021) 18-26. https://www.ijisc.comKUMARI, M., SHARMA, R., (2021), Comparative Study of Various Forgery Detection Approach for Image Processing. International Journal of Information Security and Cybercrime, 10: 18-26. https://www.ijisc.com Citation Format :
OATU, L. (2024). Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13(1), 59-65. Retrieve from https://www.ijisc.comOATU, L., 2024. Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13(1), 59-65. Available from: https://www.ijisc.comL. OATU, "Combating Man-in-the-Middle Attacks within IoT Systems," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 59-65, 2024. Available: https://www.ijisc.comOATU, L., 'Combating Man-in-the-Middle Attacks within IoT Systems', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 59-65, (2024).OATU, L.: Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime 13 (2024) 59-65. https://www.ijisc.comOATU, L., (2024), Combating Man-in-the-Middle Attacks within IoT Systems. International Journal of Information Security and Cybercrime, 13: 59-65. https://www.ijisc.com Citation Format :