MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :
GHERGHINA, C. (2012). Cyberterrorism. International Journal of Information Security and Cybercrime, 1(2), 33-39. Retrieve from https://www.ijisc.comGHERGHINA, C., 2012. Cyberterrorism. International Journal of Information Security and Cybercrime 1(2), 33-39. Available from: https://www.ijisc.comC. GHERGHINA, "Cyberterrorism," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 33-39, 2012. Available: https://www.ijisc.comGHERGHINA, C., 'Cyberterrorism', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 33-39, (2012).GHERGHINA, C.: Cyberterrorism. International Journal of Information Security and Cybercrime 1 (2012) 33-39. https://www.ijisc.comGHERGHINA, C., (2012), Cyberterrorism. International Journal of Information Security and Cybercrime, 1: 33-39. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1(2), 61-67. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1(2), 61-67. Available from: https://www.ijisc.comI.C. MIHAI, "Overview on Phishing Attacks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 61-67, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Overview on Phishing Attacks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 61-67, (2012).MIHAI, I.C.: Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1 (2012) 61-67. https://www.ijisc.comMIHAI, I.C., (2012), Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1: 61-67. https://www.ijisc.com Citation Format :
CONSTANTIN, A. (2013). Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2(1), 43-48. Retrieve from https://www.ijisc.comCONSTANTIN, A., 2013. Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2(1), 43-48. Available from: https://www.ijisc.comA. CONSTANTIN, "Cybercrime and National Security in the Context of Globalization," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 43-48, 2013. Available: https://www.ijisc.comCONSTANTIN, A., 'Cybercrime and National Security in the Context of Globalization', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 43-48, (2013).CONSTANTIN, A.: Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime 2 (2013) 43-48. https://www.ijisc.comCONSTANTIN, A., (2013), Cybercrime and National Security in the Context of Globalization. International Journal of Information Security and Cybercrime, 2: 43-48. https://www.ijisc.com Citation Format :
MARCEL, I. (2013). The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime, 2(1), 49-58. Retrieve from https://www.ijisc.comMARCEL, I., 2013. The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime 2(1), 49-58. Available from: https://www.ijisc.comI. MARCEL, "The Components of Cyber-Terrorism," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 49-58, 2013. Available: https://www.ijisc.comMARCEL, I., 'The Components of Cyber-Terrorism', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 49-58, (2013).MARCEL, I.: The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime 2 (2013) 49-58. https://www.ijisc.comMARCEL, I., (2013), The Components of Cyber-Terrorism. International Journal of Information Security and Cybercrime, 2: 49-58. https://www.ijisc.com Citation Format :
PARODI, F. (2013). The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2(1), 59-66. Retrieve from https://www.ijisc.comPARODI, F., 2013. The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2(1), 59-66. Available from: https://www.ijisc.comF. PARODI, "The Concept of Cybercrime and Online Threats Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 59-66, 2013. Available: https://www.ijisc.comPARODI, F., 'The Concept of Cybercrime and Online Threats Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 59-66, (2013).PARODI, F.: The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime 2 (2013) 59-66. https://www.ijisc.comPARODI, F., (2013), The Concept of Cybercrime and Online Threats Analysis. International Journal of Information Security and Cybercrime, 2: 59-66. https://www.ijisc.com Citation Format :
MARIN, R.I. (2014). An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3(1), 47-52. Retrieve from https://www.ijisc.comMARIN, R.I., 2014. An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3(1), 47-52. Available from: https://www.ijisc.comR.I. MARIN, "An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 47-52, 2014. Available: https://www.ijisc.comMARIN, R.I., 'An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 47-52, (2014).MARIN, R.I.: An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3 (2014) 47-52. https://www.ijisc.comMARIN, R.I., (2014), An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3: 47-52. https://www.ijisc.com Citation Format :
BASAMAC, L. (2014). Computer Frauds. International Journal of Information Security and Cybercrime, 3(1), 53-58. Retrieve from https://www.ijisc.comBASAMAC, L., 2014. Computer Frauds. International Journal of Information Security and Cybercrime 3(1), 53-58. Available from: https://www.ijisc.comL. BASAMAC, "Computer Frauds," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 53-58, 2014. Available: https://www.ijisc.comBASAMAC, L., 'Computer Frauds', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 53-58, (2014).BASAMAC, L.: Computer Frauds. International Journal of Information Security and Cybercrime 3 (2014) 53-58. https://www.ijisc.comBASAMAC, L., (2014), Computer Frauds. International Journal of Information Security and Cybercrime, 3: 53-58. https://www.ijisc.com Citation Format :
MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D., (2014). Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3(2), 37-42. Retrieve from https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 2014. Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3(2), 37-42. Available from: https://www.ijisc.comI.C. MIHAI, Ș. PRUNĂ, I.D. BARBU, "Cyber Kill Chain Analysis," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 37-42, 2014. Available: https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 'Cyber Kill Chain Analysis', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 37-42, (2014).MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D.,: Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3 (2014) 37-42. https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., (2014), Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3: 37-42. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2015). New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4(1), 15-21. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2015. New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4(1), 15-21. Available from: https://www.ijisc.comM. DOBRINOIU, "New Challenges for Cybersecurity and Possible Criminal Law," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 15-21, 2015. Available: https://www.ijisc.comDOBRINOIU, M., 'New Challenges for Cybersecurity and Possible Criminal Law', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 15-21, (2015).DOBRINOIU, M.: New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4 (2015) 15-21. https://www.ijisc.comDOBRINOIU, M., (2015), New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4: 15-21. https://www.ijisc.com Citation Format :
ÇAKIR, H.,KILIÇ, M.S., (2015). Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime, 4(2), 9-20. Retrieve from https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., 2015. Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime 4(2), 9-20. Available from: https://www.ijisc.comH. ÇAKIR, M.S. KILIÇ, "Importance of Operating Systems Type in Computer Forensics," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 9-20, 2015. Available: https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., 'Importance of Operating Systems Type in Computer Forensics', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 9-20, (2015).ÇAKIR, H.,KILIÇ, M.S.,: Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime 4 (2015) 9-20. https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., (2015), Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime, 4: 9-20. https://www.ijisc.com Citation Format :
EFG, A. (2015). The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4(2), 33-48. Retrieve from https://www.ijisc.comEFG, A., 2015. The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime 4(2), 33-48. Available from: https://www.ijisc.comA. EFG, "The Challenges to Enforcement of Cybercrimes Laws and Policy," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 33-48, 2015. Available: https://www.ijisc.comEFG, A., 'The Challenges to Enforcement of Cybercrimes Laws and Policy', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 33-48, (2015).EFG, A.: The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime 4 (2015) 33-48. https://www.ijisc.comEFG, A., (2015), The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4: 33-48. https://www.ijisc.com Citation Format :
HOLM, E. (2015). Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime, 4(2), 49-60. Retrieve from https://www.ijisc.comHOLM, E., 2015. Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime 4(2), 49-60. Available from: https://www.ijisc.comE. HOLM, "Identity Crime: Deliberating on Remedies for the Victim," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 49-60, 2015. Available: https://www.ijisc.comHOLM, E., 'Identity Crime: Deliberating on Remedies for the Victim', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 49-60, (2015).HOLM, E.: Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime 4 (2015) 49-60. https://www.ijisc.comHOLM, E., (2015), Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime, 4: 49-60. https://www.ijisc.com Citation Format :
NWOYE, C.J. (2015). Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4(2), 61-72. Retrieve from https://www.ijisc.comNWOYE, C.J., 2015. Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4(2), 61-72. Available from: https://www.ijisc.comC.J. NWOYE, "Cybercrime Prevention in Online Transaction Using Biometric Access Control," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 61-72, 2015. Available: https://www.ijisc.comNWOYE, C.J., 'Cybercrime Prevention in Online Transaction Using Biometric Access Control', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 61-72, (2015).NWOYE, C.J.: Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4 (2015) 61-72. https://www.ijisc.comNWOYE, C.J., (2015), Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4: 61-72. https://www.ijisc.com Citation Format :
RAZA, M.S. (2015). Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime, 4(2), 86-90. Retrieve from https://www.ijisc.comRAZA, M.S., 2015. Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime 4(2), 86-90. Available from: https://www.ijisc.comM.S. RAZA, "Cyber Laundering: Understanding the Trends and Typologies," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 86-90, 2015. Available: https://www.ijisc.comRAZA, M.S., 'Cyber Laundering: Understanding the Trends and Typologies', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 86-90, (2015).RAZA, M.S.: Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime 4 (2015) 86-90. https://www.ijisc.comRAZA, M.S., (2015), Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime, 4: 86-90. https://www.ijisc.com Citation Format :
EFG, A. (2016). The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5(2), 31-50. Retrieve from https://www.ijisc.comEFG, A., 2016. The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5(2), 31-50. Available from: https://www.ijisc.comA. EFG, "The Impact of Cybercrimes on Global Trade and Commerce," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 31-50, 2016. Available: https://www.ijisc.comEFG, A., 'The Impact of Cybercrimes on Global Trade and Commerce', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 31-50, (2016).EFG, A.: The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5 (2016) 31-50. https://www.ijisc.comEFG, A., (2016), The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5: 31-50. https://www.ijisc.com Citation Format :
HOLM, E. (2017). The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime, 6(1), 41-50. Retrieve from https://www.ijisc.comHOLM, E., 2017. The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime 6(1), 41-50. Available from: https://www.ijisc.comE. HOLM, "The Darknet: A New Passageway to Identity Theft," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 41-50, 2017. Available: https://www.ijisc.comHOLM, E., 'The Darknet: A New Passageway to Identity Theft', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 41-50, (2017).HOLM, E.: The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime 6 (2017) 41-50. https://www.ijisc.comHOLM, E., (2017), The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime, 6: 41-50. https://www.ijisc.com Citation Format :
MURALI, S.P. (2017). Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime, 6(1), 63-66. Retrieve from https://www.ijisc.comMURALI, S.P., 2017. Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime 6(1), 63-66. Available from: https://www.ijisc.comS.P. MURALI, "Detecting Cyber Bullies on Twitter using Machine Learning Techniques," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 63-66, 2017. Available: https://www.ijisc.comMURALI, S.P., 'Detecting Cyber Bullies on Twitter using Machine Learning Techniques', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 63-66, (2017).MURALI, S.P.: Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime 6 (2017) 63-66. https://www.ijisc.comMURALI, S.P., (2017), Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime, 6: 63-66. https://www.ijisc.com Citation Format :
HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A., (2017). Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6(2), 9-16. Retrieve from https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 2017. Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6(2), 9-16. Available from: https://www.ijisc.comM.S. HASHIM, N.A. RAHMAN, A.N. ZIN, K.A. MAHAMAD, F.A. AHMAD, "Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 9-16, 2017. Available: https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 'Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 9-16, (2017).HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A.,: Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6 (2017) 9-16. https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., (2017), Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6: 9-16. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :