OANCEA, C.V. (2014). Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3(2), 43-48. Retrieve from https://www.ijisc.comOANCEA, C.V., 2014. Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3(2), 43-48. Available from: https://www.ijisc.comC.V. OANCEA, "Cybersecurity in Cloud Computing Context," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 43-48, 2014. Available: https://www.ijisc.comOANCEA, C.V., 'Cybersecurity in Cloud Computing Context', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 43-48, (2014).OANCEA, C.V.: Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3 (2014) 43-48. https://www.ijisc.comOANCEA, C.V., (2014), Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3: 43-48. https://www.ijisc.com Citation Format :
IWASOKUN, G.B. (2016). A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime, 5(2), 71-86. Retrieve from https://www.ijisc.comIWASOKUN, G.B., 2016. A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime 5(2), 71-86. Available from: https://www.ijisc.comG.B. IWASOKUN, "A Fingerprint-Based Scheme for ATM User Authentication," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 71-86, 2016. Available: https://www.ijisc.comIWASOKUN, G.B., 'A Fingerprint-Based Scheme for ATM User Authentication', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 71-86, (2016).IWASOKUN, G.B.: A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime 5 (2016) 71-86. https://www.ijisc.comIWASOKUN, G.B., (2016), A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime, 5: 71-86. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2017). Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6(1), 25-32. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2017. Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6(1), 25-32. Available from: https://www.ijisc.comM. DOBRINOIU, "Need for Education on Cybersecurity," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 25-32, 2017. Available: https://www.ijisc.comDOBRINOIU, M., 'Need for Education on Cybersecurity', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 25-32, (2017).DOBRINOIU, M.: Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6 (2017) 25-32. https://www.ijisc.comDOBRINOIU, M., (2017), Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6: 25-32. https://www.ijisc.com Citation Format :
NĂSTASE, L. (2017). Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6(1), 51-56. Retrieve from https://www.ijisc.comNĂSTASE, L., 2017. Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6(1), 51-56. Available from: https://www.ijisc.comL. NĂSTASE, "Public Key Infrastructures for Trust and Authentication in the IoT," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 51-56, 2017. Available: https://www.ijisc.comNĂSTASE, L., 'Public Key Infrastructures for Trust and Authentication in the IoT', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 51-56, (2017).NĂSTASE, L.: Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6 (2017) 51-56. https://www.ijisc.comNĂSTASE, L., (2017), Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6: 51-56. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: https://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. https://www.ijisc.com Citation Format :
ANGHEL, M.C. (2017). Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime, 6(2), 27-34. Retrieve from https://www.ijisc.comANGHEL, M.C., 2017. Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime 6(2), 27-34. Available from: https://www.ijisc.comM.C. ANGHEL, "Transaction Security in Online Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 27-34, 2017. Available: https://www.ijisc.comANGHEL, M.C., 'Transaction Security in Online Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 27-34, (2017).ANGHEL, M.C.: Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime 6 (2017) 27-34. https://www.ijisc.comANGHEL, M.C., (2017), Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime, 6: 27-34. https://www.ijisc.com Citation Format :
COMAN, I.M. (2017). Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6(2), 47-52. Retrieve from https://www.ijisc.comCOMAN, I.M., 2017. Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6(2), 47-52. Available from: https://www.ijisc.comI.M. COMAN, "Cross-Border Cyber-Attacks and Critical Infrastructure Protection," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 47-52, 2017. Available: https://www.ijisc.comCOMAN, I.M., 'Cross-Border Cyber-Attacks and Critical Infrastructure Protection', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 47-52, (2017).COMAN, I.M.: Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6 (2017) 47-52. https://www.ijisc.comCOMAN, I.M., (2017), Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6: 47-52. https://www.ijisc.com Citation Format :
VASILE, C.M. (2018). Firewall Technologies. International Journal of Information Security and Cybercrime, 7(1), 37-44. Retrieve from https://www.ijisc.comVASILE, C.M., 2018. Firewall Technologies. International Journal of Information Security and Cybercrime 7(1), 37-44. Available from: https://www.ijisc.comC.M. VASILE, "Firewall Technologies," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 37-44, 2018. Available: https://www.ijisc.comVASILE, C.M., 'Firewall Technologies', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 37-44, (2018).VASILE, C.M.: Firewall Technologies. International Journal of Information Security and Cybercrime 7 (2018) 37-44. https://www.ijisc.comVASILE, C.M., (2018), Firewall Technologies. International Journal of Information Security and Cybercrime, 7: 37-44. https://www.ijisc.com Citation Format :
CERNOV, A.M. (2018). Security in Computer Networks. International Journal of Information Security and Cybercrime, 7(1), 45-52. Retrieve from https://www.ijisc.comCERNOV, A.M., 2018. Security in Computer Networks. International Journal of Information Security and Cybercrime 7(1), 45-52. Available from: https://www.ijisc.comA.M. CERNOV, "Security in Computer Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 45-52, 2018. Available: https://www.ijisc.comCERNOV, A.M., 'Security in Computer Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 45-52, (2018).CERNOV, A.M.: Security in Computer Networks. International Journal of Information Security and Cybercrime 7 (2018) 45-52. https://www.ijisc.comCERNOV, A.M., (2018), Security in Computer Networks. International Journal of Information Security and Cybercrime, 7: 45-52. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2018). Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7(2), 9-13. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2018. Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7(2), 9-13. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Using Embedded Platforms to Monitor Network Security," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 9-13, 2018. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Using Embedded Platforms to Monitor Network Security', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 9-13, (2018).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7 (2018) 9-13. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2018), Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7: 9-13. https://www.ijisc.com Citation Format :
VLAD, I.M. (2018). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7(2), 14-24. Retrieve from https://www.ijisc.comVLAD, I.M., 2018. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7(2), 14-24. Available from: https://www.ijisc.comI.M. VLAD, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 14-24, 2018. Available: https://www.ijisc.comVLAD, I.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 14-24, (2018).VLAD, I.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7 (2018) 14-24. https://www.ijisc.comVLAD, I.M., (2018), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7: 14-24. https://www.ijisc.com Citation Format :
POPESCU, I. (2018). The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7(2), 25-32. Retrieve from https://www.ijisc.comPOPESCU, I., 2018. The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7(2), 25-32. Available from: https://www.ijisc.comI. POPESCU, "The Influence of Vulnerabilities on the Information Systems and Methods of Prevention," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 25-32, 2018. Available: https://www.ijisc.comPOPESCU, I., 'The Influence of Vulnerabilities on the Information Systems and Methods of Prevention', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 25-32, (2018).POPESCU, I.: The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7 (2018) 25-32. https://www.ijisc.comPOPESCU, I., (2018), The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7: 25-32. https://www.ijisc.com Citation Format :
BOROȘEANU, E.I. (2018). Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime, 7(2), 33-40. Retrieve from https://www.ijisc.comBOROȘEANU, E.I., 2018. Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime 7(2), 33-40. Available from: https://www.ijisc.comE.I. BOROȘEANU, "Wi-Fi Security Dedicated Architectures," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 33-40, 2018. Available: https://www.ijisc.comBOROȘEANU, E.I., 'Wi-Fi Security Dedicated Architectures', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 33-40, (2018).BOROȘEANU, E.I.: Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime 7 (2018) 33-40. https://www.ijisc.comBOROȘEANU, E.I., (2018), Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime, 7: 33-40. https://www.ijisc.com Citation Format :
MAREȘ, M.S. (2018). Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7(2), 41-51. Retrieve from https://www.ijisc.comMAREȘ, M.S., 2018. Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7(2), 41-51. Available from: https://www.ijisc.comM.S. MAREȘ, "Solutions to Secure a Network," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 41-51, 2018. Available: https://www.ijisc.comMAREȘ, M.S., 'Solutions to Secure a Network', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 41-51, (2018).MAREȘ, M.S.: Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7 (2018) 41-51. https://www.ijisc.comMAREȘ, M.S., (2018), Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7: 41-51. https://www.ijisc.com Citation Format :
ABDULHAMID, M.,GICHUKI, N., (2019). Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8(1), 13-22. Retrieve from https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 2019. Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8(1), 13-22. Available from: https://www.ijisc.comM. ABDULHAMID, N. GICHUKI, "Comparative Study of Cryptographic Algorithms," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 13-22, 2019. Available: https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 'Comparative Study of Cryptographic Algorithms', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 13-22, (2019).ABDULHAMID, M.,GICHUKI, N.,: Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8 (2019) 13-22. https://www.ijisc.comABDULHAMID, M., GICHUKI, N., (2019), Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8: 13-22. https://www.ijisc.com Citation Format :
DJEROUNI, M. (2019). Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime, 8(1), 23-29. Retrieve from https://www.ijisc.comDJEROUNI, M., 2019. Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime 8(1), 23-29. Available from: https://www.ijisc.comM. DJEROUNI, "Implication of Employees in Security Policies Definition," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 23-29, 2019. Available: https://www.ijisc.comDJEROUNI, M., 'Implication of Employees in Security Policies Definition', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 23-29, (2019).DJEROUNI, M.: Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime 8 (2019) 23-29. https://www.ijisc.comDJEROUNI, M., (2019), Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime, 8: 23-29. https://www.ijisc.com Citation Format :
GOLDMAN, E. (2019). Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime, 8(1), 30-34. Retrieve from https://www.ijisc.comGOLDMAN, E., 2019. Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime 8(1), 30-34. Available from: https://www.ijisc.comE. GOLDMAN, "Push the Button: Making Security Training Fun and Interactive," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 30-34, 2019. Available: https://www.ijisc.comGOLDMAN, E., 'Push the Button: Making Security Training Fun and Interactive', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 30-34, (2019).GOLDMAN, E.: Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime 8 (2019) 30-34. https://www.ijisc.comGOLDMAN, E., (2019), Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime, 8: 30-34. https://www.ijisc.com Citation Format :
HAGGMAN, A. (2019). Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime, 8(1), 35-38. Retrieve from https://www.ijisc.comHAGGMAN, A., 2019. Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime 8(1), 35-38. Available from: https://www.ijisc.comA. HAGGMAN, "Wargaming in Cyber Security Education and Awareness Training," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 35-38, 2019. Available: https://www.ijisc.comHAGGMAN, A., 'Wargaming in Cyber Security Education and Awareness Training', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 35-38, (2019).HAGGMAN, A.: Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime 8 (2019) 35-38. https://www.ijisc.comHAGGMAN, A., (2019), Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime, 8: 35-38. https://www.ijisc.com Citation Format :