MARTIN, I. (2015). Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4(1), 33-40. Retrieve from https://www.ijisc.comMARTIN, I., 2015. Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4(1), 33-40. Available from: https://www.ijisc.comI. MARTIN, "Cyber Security Strategies – an Overview," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 33-40, 2015. Available: https://www.ijisc.comMARTIN, I., 'Cyber Security Strategies – an Overview', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 33-40, (2015).MARTIN, I.: Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4 (2015) 33-40. https://www.ijisc.comMARTIN, I., (2015), Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4: 33-40. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2015). Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4(1), 59-62. Retrieve from https://www.ijisc.comOANCEA, C.V., 2015. Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4(1), 59-62. Available from: https://www.ijisc.comC.V. OANCEA, "Artificial Intelligence Role in Cybersecurity Infrastructures," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 59-62, 2015. Available: https://www.ijisc.comOANCEA, C.V., 'Artificial Intelligence Role in Cybersecurity Infrastructures', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 59-62, (2015).OANCEA, C.V.: Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4 (2015) 59-62. https://www.ijisc.comOANCEA, C.V., (2015), Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4: 59-62. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D., (2015). Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4(2), 27-32. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., 2015. Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4(2), 27-32. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, "Ransomware – an Emerging Threat," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 27-32, 2015. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., 'Ransomware – an Emerging Threat', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 27-32, (2015).PASCARIU, C.,BARBU, I.D.,: Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comPASCARIU, C., BARBU, I.D., (2015), Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
EFG, A. (2016). The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5(2), 31-50. Retrieve from https://www.ijisc.comEFG, A., 2016. The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5(2), 31-50. Available from: https://www.ijisc.comA. EFG, "The Impact of Cybercrimes on Global Trade and Commerce," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 31-50, 2016. Available: https://www.ijisc.comEFG, A., 'The Impact of Cybercrimes on Global Trade and Commerce', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 31-50, (2016).EFG, A.: The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5 (2016) 31-50. https://www.ijisc.comEFG, A., (2016), The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5: 31-50. https://www.ijisc.com Citation Format :
MARCOCI, P.M. (2016). Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime, 5(2), 51-56. Retrieve from https://www.ijisc.comMARCOCI, P.M., 2016. Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime 5(2), 51-56. Available from: https://www.ijisc.comP.M. MARCOCI, "Cyber Espionage Incrimination in Romanian Legislation," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 51-56, 2016. Available: https://www.ijisc.comMARCOCI, P.M., 'Cyber Espionage Incrimination in Romanian Legislation', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 51-56, (2016).MARCOCI, P.M.: Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime 5 (2016) 51-56. https://www.ijisc.comMARCOCI, P.M., (2016), Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime, 5: 51-56. https://www.ijisc.com Citation Format :
HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A., (2017). Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6(2), 9-16. Retrieve from https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 2017. Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6(2), 9-16. Available from: https://www.ijisc.comM.S. HASHIM, N.A. RAHMAN, A.N. ZIN, K.A. MAHAMAD, F.A. AHMAD, "Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 9-16, 2017. Available: https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 'Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 9-16, (2017).HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A.,: Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6 (2017) 9-16. https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., (2017), Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6: 9-16. https://www.ijisc.com Citation Format :
BEŞLIU, D.C. (2017). Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6(2), 35-39. Retrieve from https://www.ijisc.comBEŞLIU, D.C., 2017. Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6(2), 35-39. Available from: https://www.ijisc.comD.C. BEŞLIU, "Cyber Terrorism – A Growing Threat in the Field of Cyber Security," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 35-39, 2017. Available: https://www.ijisc.comBEŞLIU, D.C., 'Cyber Terrorism – A Growing Threat in the Field of Cyber Security', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 35-39, (2017).BEŞLIU, D.C.: Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6 (2017) 35-39. https://www.ijisc.comBEŞLIU, D.C., (2017), Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6: 35-39. https://www.ijisc.com Citation Format :
CRĂCIUN, A.M. (2018). Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7(1), 23-31. Retrieve from https://www.ijisc.comCRĂCIUN, A.M., 2018. Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7(1), 23-31. Available from: https://www.ijisc.comA.M. CRĂCIUN, "Threats and Risks to Telecommunications Systems," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 23-31, 2018. Available: https://www.ijisc.comCRĂCIUN, A.M., 'Threats and Risks to Telecommunications Systems', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 23-31, (2018).CRĂCIUN, A.M.: Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7 (2018) 23-31. https://www.ijisc.comCRĂCIUN, A.M., (2018), Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7: 23-31. https://www.ijisc.com Citation Format :
AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A., (2019). Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8(2), 9-20. Retrieve from https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 2019. Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8(2), 9-20. Available from: https://www.ijisc.comA. AJIBOLA, I. UJATA, O. ADELAIYE, N.A. RAHMAN, "Mitigating Advanced Persistent Threats: A Comparative Evaluation Review," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 9-20, 2019. Available: https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., 'Mitigating Advanced Persistent Threats: A Comparative Evaluation Review', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 9-20, (2019).AJIBOLA, A.,UJATA, I.,ADELAIYE, O.,RAHMAN, N.A.,: Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime 8 (2019) 9-20. https://www.ijisc.comAJIBOLA, A., UJATA, I., ADELAIYE, O., RAHMAN, N.A., (2019), Mitigating Advanced Persistent Threats: A Comparative Evaluation Review. International Journal of Information Security and Cybercrime, 8: 9-20. https://www.ijisc.com Citation Format :
PETRICĂ, G. (2019). A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8(2), 21-26. Retrieve from https://www.ijisc.comPETRICĂ, G., 2019. A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8(2), 21-26. Available from: https://www.ijisc.comG. PETRICĂ, "A Study on Password Strength in Wireless Encryption Protocols," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 21-26, 2019. Available: https://www.ijisc.comPETRICĂ, G., 'A Study on Password Strength in Wireless Encryption Protocols', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 21-26, (2019).PETRICĂ, G.: A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8 (2019) 21-26. https://www.ijisc.comPETRICĂ, G., (2019), A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8: 21-26. https://www.ijisc.com Citation Format :
BELSHAW, S.H. (2019). Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime, 8(2), 27-38. Retrieve from https://www.ijisc.comBELSHAW, S.H., 2019. Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime 8(2), 27-38. Available from: https://www.ijisc.comS.H. BELSHAW, "Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 27-38, 2019. Available: https://www.ijisc.comBELSHAW, S.H., 'Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 27-38, (2019).BELSHAW, S.H.: Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime 8 (2019) 27-38. https://www.ijisc.comBELSHAW, S.H., (2019), Investigating the New Criminal Neighborhood: The Need for Dark Web Education for Law Enforcement Personnel. International Journal of Information Security and Cybercrime, 8: 27-38. https://www.ijisc.com Citation Format :
BEST, M.,KRUMOV, L.,BACIVAROV, I., (2019). Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8(2), 39-52. Retrieve from https://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 2019. Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8(2), 39-52. Available from: https://www.ijisc.comM. BEST, L. KRUMOV, I. BACIVAROV, "Cyber Security in Banking Sector," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 39-52, 2019. Available: https://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., 'Cyber Security in Banking Sector', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 39-52, (2019).BEST, M.,KRUMOV, L.,BACIVAROV, I.,: Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime 8 (2019) 39-52. https://www.ijisc.comBEST, M., KRUMOV, L., BACIVAROV, I., (2019), Cyber Security in Banking Sector. International Journal of Information Security and Cybercrime, 8: 39-52. https://www.ijisc.com Citation Format :
STAMATAKIS, N.,SMITH, T., (2019). Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime, 8(2), 53-88. Retrieve from https://www.ijisc.comSTAMATAKIS, N., SMITH, T., 2019. Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime 8(2), 53-88. Available from: https://www.ijisc.comN. STAMATAKIS, T. SMITH, "Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 53-88, 2019. Available: https://www.ijisc.comSTAMATAKIS, N., SMITH, T., 'Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 53-88, (2019).STAMATAKIS, N.,SMITH, T.,: Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime 8 (2019) 53-88. https://www.ijisc.comSTAMATAKIS, N., SMITH, T., (2019), Cyber-Victimization Trends in Trinidad & Tobago: The Results of an Empirical Research. International Journal of Information Security and Cybercrime, 8: 53-88. https://www.ijisc.com Citation Format :
MIHAI, I.C.,ZETU, C., (2019). Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8(2), 89-96. Retrieve from https://www.ijisc.comMIHAI, I.C., ZETU, C., 2019. Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8(2), 89-96. Available from: https://www.ijisc.comI.C. MIHAI, C. ZETU, "Romanian Law Enforcement Involvement in Fighting Cyber Crime," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 89-96, 2019. Available: https://www.ijisc.comMIHAI, I.C., ZETU, C., 'Romanian Law Enforcement Involvement in Fighting Cyber Crime', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 89-96, (2019).MIHAI, I.C.,ZETU, C.,: Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime 8 (2019) 89-96. https://www.ijisc.comMIHAI, I.C., ZETU, C., (2019), Romanian Law Enforcement Involvement in Fighting Cyber Crime. International Journal of Information Security and Cybercrime, 8: 89-96. https://www.ijisc.com Citation Format :
RICCI, S.,HAJNY, J.,PIESARSKAS, E.,PARKER, S.,JANOUT, V., (2020). Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime, 9(2), 7-11. Retrieve from https://www.ijisc.comRICCI, S., HAJNY, J., PIESARSKAS, E., PARKER, S., JANOUT, V., 2020. Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime 9(2), 7-11. Available from: https://www.ijisc.comS. RICCI, J. HAJNY, E. PIESARSKAS, S. PARKER, V. JANOUT, "Challenges in Cyber Security Education," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 7-11, 2020. Available: https://www.ijisc.comRICCI, S., HAJNY, J., PIESARSKAS, E., PARKER, S., JANOUT, V., 'Challenges in Cyber Security Education', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 7-11, (2020).RICCI, S.,HAJNY, J.,PIESARSKAS, E.,PARKER, S.,JANOUT, V.,: Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime 9 (2020) 7-11. https://www.ijisc.comRICCI, S., HAJNY, J., PIESARSKAS, E., PARKER, S., JANOUT, V., (2020), Challenges in Cyber Security Education. International Journal of Information Security and Cybercrime, 9: 7-11. https://www.ijisc.com Citation Format :
OPRIȘ, C.O. (2022). Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime, 11(1), 41-48. Retrieve from https://www.ijisc.comOPRIȘ, C.O., 2022. Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime 11(1), 41-48. Available from: https://www.ijisc.comC.O. OPRIȘ, "Cybercrime Evolution and Current Threats," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 41-48, 2022. Available: https://www.ijisc.comOPRIȘ, C.O., 'Cybercrime Evolution and Current Threats', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 41-48, (2022).OPRIȘ, C.O.: Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime 11 (2022) 41-48. https://www.ijisc.comOPRIȘ, C.O., (2022), Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime, 11: 41-48. https://www.ijisc.com Citation Format :
POPESCU, E.E. (2024). VoIP Security Threats. International Journal of Information Security and Cybercrime, 13(1), 66-70. Retrieve from https://www.ijisc.comPOPESCU, E.E., 2024. VoIP Security Threats. International Journal of Information Security and Cybercrime 13(1), 66-70. Available from: https://www.ijisc.comE.E. POPESCU, "VoIP Security Threats," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 66-70, 2024. Available: https://www.ijisc.comPOPESCU, E.E., 'VoIP Security Threats', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 66-70, (2024).POPESCU, E.E.: VoIP Security Threats. International Journal of Information Security and Cybercrime 13 (2024) 66-70. https://www.ijisc.comPOPESCU, E.E., (2024), VoIP Security Threats. International Journal of Information Security and Cybercrime, 13: 66-70. https://www.ijisc.com Citation Format :