IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the tag "cybersecurity"

    Cybersecurity in Cloud Computing Context

    Author(s): OANCEA, Cristian-Vlad
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.02.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations


    A Fingerprint-Based Scheme for ATM User Authentication

    Author(s): IWASOKUN, Gabriel B.
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2016.02.07
    Pages: 71-86
    AbstractPlus | Quick view | Full article | Citations


    Strategic Management of Critical Infrastructures and Financial Domain

    Author(s): ŞCHEAU, Mircea-Constantin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.01
    Pages: 13-24
    AbstractPlus | Quick view | Full article | Citations


    Need for Education on Cybersecurity

    Author(s): DOBRINOIU, Maxim
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.01.02
    Pages: 25-32
    AbstractPlus | Quick view | Full article | Citations


    Public Key Infrastructures for Trust and Authentication in the IoT

    Author(s): NĂSTASE, Lavinia
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.05
    Pages: 51-56
    AbstractPlus | Quick view | Full article | Citations


    Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry

    Author(s): PASCARIU, Cristian; BARBU, Ionuț-Daniel; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.01.06
    Pages: 57-62
    AbstractPlus | Quick view | Full article | Citations


    Browsers Cookies – An (In)security Analysis

    Author(s): AXINTE, Sabina-Daniela; PETRICĂ, Gabriel; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.02.03
    Pages: 23-26
    AbstractPlus | Quick view | Full article | Citations


    Transaction Security in Online Banking and e-Commerce

    Author(s): ANGHEL, Mihai-Ciprian
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.02.04
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Cross-Border Cyber-Attacks and Critical Infrastructure Protection

    Author(s): COMAN, Iulian Marius
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.02.07
    Pages: 47-52
    AbstractPlus | Quick view | Full article | Citations


    Firewall Technologies

    Author(s): VASILE, Cristinel Marius
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2018.01.04
    Pages: 37-44
    AbstractPlus | Quick view | Full article | Citations


    Security in Computer Networks

    Author(s): CERNOV, Ana-Maria
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2018.01.05
    Pages: 45-52
    AbstractPlus | Quick view | Full article | Citations


    Using Embedded Platforms to Monitor Network Security

    Author(s): PASCARIU, Cristian; BARBU, Ionuţ-Daniel; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.02.01
    Pages: 9-13
    AbstractPlus | Quick view | Full article | Citations


    Security of Personal Data in Social Networks

    Author(s): VLAD, Ionela-Mariana
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2018.02.02
    Pages: 14-24
    AbstractPlus | Quick view | Full article | Citations


    The Influence of Vulnerabilities on the Information Systems and Methods of Prevention

    Author(s): POPESCU, Irina
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2018.02.03
    Pages: 25-32
    AbstractPlus | Quick view | Full article | Citations


    Wi-Fi Security Dedicated Architectures

    Author(s): BOROȘEANU, Eduard-Ionuț
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2018.02.04
    Pages: 33-40
    AbstractPlus | Quick view | Full article | Citations


    Solutions to Secure a Network

    Author(s): MAREȘ, Marian-Sorin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2018.02.05
    Pages: 41-51
    AbstractPlus | Quick view | Full article | Citations


    Comparative Study of Cryptographic Algorithms

    Author(s): ABDULHAMID, Mohanad; GICHUKI, Nyagathu
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2019.01.01
    Pages: 13-22
    AbstractPlus | Quick view | Full article | Citations


    Implication of Employees in Security Policies Definition

    Author(s): DJEROUNI, Myriam
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2019.01.02
    Pages: 23-29
    AbstractPlus | Quick view | Full article | Citations


    Push the Button: Making Security Training Fun and Interactive

    Author(s): GOLDMAN, E.
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2019.01.03
    Pages: 30-34
    AbstractPlus | Quick view | Full article | Citations


    Wargaming in Cyber Security Education and Awareness Training

    Author(s): HAGGMAN, Andreas
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2019.01.04
    Pages: 35-38
    AbstractPlus | Quick view | Full article | Citations