VOICU, M. (2012). LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1(1), 19-25. Retrieve from https://www.ijisc.comVOICU, M., 2012. LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1(1), 19-25. Available from: https://www.ijisc.comM. VOICU, "LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 19-25, 2012. Available: https://www.ijisc.comVOICU, M., 'LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 19-25, (2012).VOICU, M.: LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1 (2012) 19-25. https://www.ijisc.comVOICU, M., (2012), LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1: 19-25. https://www.ijisc.com Citation Format :
ILIE, R.C. (2013). Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2(1), 9-16. Retrieve from https://www.ijisc.comILIE, R.C., 2013. Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2(1), 9-16. Available from: https://www.ijisc.comR.C. ILIE, "Online Transactions Security in Internet Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 9-16, 2013. Available: https://www.ijisc.comILIE, R.C., 'Online Transactions Security in Internet Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 9-16, (2013).ILIE, R.C.: Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2 (2013) 9-16. https://www.ijisc.comILIE, R.C., (2013), Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2: 9-16. https://www.ijisc.com Citation Format :
IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from https://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: https://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: https://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. https://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. https://www.ijisc.com Citation Format :
GROSU, V.A. (2013). Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2(2), 19-26. Retrieve from https://www.ijisc.comGROSU, V.A., 2013. Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2(2), 19-26. Available from: https://www.ijisc.comV.A. GROSU, "Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 19-26, 2013. Available: https://www.ijisc.comGROSU, V.A., 'Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 19-26, (2013).GROSU, V.A.: Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2 (2013) 19-26. https://www.ijisc.comGROSU, V.A., (2013), Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2: 19-26. https://www.ijisc.com Citation Format :
FIDA, M.,JOVITH, A.A., (2016). Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5(1), 75-80. Retrieve from https://www.ijisc.comFIDA, M., JOVITH, A.A., 2016. Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5(1), 75-80. Available from: https://www.ijisc.comM. FIDA, A.A. JOVITH, "Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 75-80, 2016. Available: https://www.ijisc.comFIDA, M., JOVITH, A.A., 'Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 75-80, (2016).FIDA, M.,JOVITH, A.A.,: Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime 5 (2016) 75-80. https://www.ijisc.comFIDA, M., JOVITH, A.A., (2016), Anti-Phishing Strategy Model for Detection of Phishing Website in E-Banking. International Journal of Information Security and Cybercrime, 5: 75-80. https://www.ijisc.com Citation Format :
PRICOPE, R. (2017). Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6(1), 33-40. Retrieve from https://www.ijisc.comPRICOPE, R., 2017. Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6(1), 33-40. Available from: https://www.ijisc.comR. PRICOPE, "Hardware and Software Technologies used in the Financial Industry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 33-40, 2017. Available: https://www.ijisc.comPRICOPE, R., 'Hardware and Software Technologies used in the Financial Industry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 33-40, (2017).PRICOPE, R.: Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6 (2017) 33-40. https://www.ijisc.comPRICOPE, R., (2017), Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6: 33-40. https://www.ijisc.com Citation Format :
NĂSTASE, L. (2017). Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6(1), 51-56. Retrieve from https://www.ijisc.comNĂSTASE, L., 2017. Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6(1), 51-56. Available from: https://www.ijisc.comL. NĂSTASE, "Public Key Infrastructures for Trust and Authentication in the IoT," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 51-56, 2017. Available: https://www.ijisc.comNĂSTASE, L., 'Public Key Infrastructures for Trust and Authentication in the IoT', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 51-56, (2017).NĂSTASE, L.: Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6 (2017) 51-56. https://www.ijisc.comNĂSTASE, L., (2017), Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6: 51-56. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
PAULIȘ, M.A. (2017). Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6(2), 40-46. Retrieve from https://www.ijisc.comPAULIȘ, M.A., 2017. Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6(2), 40-46. Available from: https://www.ijisc.comM.A. PAULIȘ, "Solutions for Network Traffic Security: VPN Through IPsec and PKI," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 40-46, 2017. Available: https://www.ijisc.comPAULIȘ, M.A., 'Solutions for Network Traffic Security: VPN Through IPsec and PKI', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 40-46, (2017).PAULIȘ, M.A.: Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6 (2017) 40-46. https://www.ijisc.comPAULIȘ, M.A., (2017), Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6: 40-46. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :
CERNOV, A.M. (2018). Security in Computer Networks. International Journal of Information Security and Cybercrime, 7(1), 45-52. Retrieve from https://www.ijisc.comCERNOV, A.M., 2018. Security in Computer Networks. International Journal of Information Security and Cybercrime 7(1), 45-52. Available from: https://www.ijisc.comA.M. CERNOV, "Security in Computer Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 45-52, 2018. Available: https://www.ijisc.comCERNOV, A.M., 'Security in Computer Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 45-52, (2018).CERNOV, A.M.: Security in Computer Networks. International Journal of Information Security and Cybercrime 7 (2018) 45-52. https://www.ijisc.comCERNOV, A.M., (2018), Security in Computer Networks. International Journal of Information Security and Cybercrime, 7: 45-52. https://www.ijisc.com Citation Format :
ABDULHAMID, M.,GICHUKI, N., (2019). Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8(1), 13-22. Retrieve from https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 2019. Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8(1), 13-22. Available from: https://www.ijisc.comM. ABDULHAMID, N. GICHUKI, "Comparative Study of Cryptographic Algorithms," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 13-22, 2019. Available: https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 'Comparative Study of Cryptographic Algorithms', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 13-22, (2019).ABDULHAMID, M.,GICHUKI, N.,: Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8 (2019) 13-22. https://www.ijisc.comABDULHAMID, M., GICHUKI, N., (2019), Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8: 13-22. https://www.ijisc.com Citation Format :
PETRICĂ, G. (2019). A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8(2), 21-26. Retrieve from https://www.ijisc.comPETRICĂ, G., 2019. A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8(2), 21-26. Available from: https://www.ijisc.comG. PETRICĂ, "A Study on Password Strength in Wireless Encryption Protocols," International Journal of Information Security and Cybercrime, vol. 8, no. 2, pp. 21-26, 2019. Available: https://www.ijisc.comPETRICĂ, G., 'A Study on Password Strength in Wireless Encryption Protocols', International Journal of Information Security and Cybercrime, vol. 8, no. 2, 21-26, (2019).PETRICĂ, G.: A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime 8 (2019) 21-26. https://www.ijisc.comPETRICĂ, G., (2019), A Study on Password Strength in Wireless Encryption Protocols. International Journal of Information Security and Cybercrime, 8: 21-26. https://www.ijisc.com Citation Format :
ABIODUN, A.,LAWAL, O.,OYEBIYI, O.,JOSEPH, O.,ADETORO, A., (2021). Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime, 10(2), 21-30. Retrieve from https://www.ijisc.comABIODUN, A., LAWAL, O., OYEBIYI, O., JOSEPH, O., ADETORO, A., 2021. Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime 10(2), 21-30. Available from: https://www.ijisc.comA. ABIODUN, O. LAWAL, O. OYEBIYI, O. JOSEPH, A. ADETORO, "Performance Evaluation of Selected Encryption Algorithms," International Journal of Information Security and Cybercrime, vol. 10, no. 2, pp. 21-30, 2021. Available: https://www.ijisc.comABIODUN, A., LAWAL, O., OYEBIYI, O., JOSEPH, O., ADETORO, A., 'Performance Evaluation of Selected Encryption Algorithms', International Journal of Information Security and Cybercrime, vol. 10, no. 2, 21-30, (2021).ABIODUN, A.,LAWAL, O.,OYEBIYI, O.,JOSEPH, O.,ADETORO, A.,: Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime 10 (2021) 21-30. https://www.ijisc.comABIODUN, A., LAWAL, O., OYEBIYI, O., JOSEPH, O., ADETORO, A., (2021), Performance Evaluation of Selected Encryption Algorithms. International Journal of Information Security and Cybercrime, 10: 21-30. https://www.ijisc.com Citation Format :
GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M., (2023). A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12(2), 9-22. Retrieve from https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 2023. A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12(2), 9-22. Available from: https://www.ijisc.comT.A. GIWA, O.I. ABIODUN, A.E. OMOLARA, R.M. ISIAKA, "A Hybridized Honey Encryption for Data Security using Residue Number System," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 9-22, 2023. Available: https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 'A Hybridized Honey Encryption for Data Security using Residue Number System', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 9-22, (2023).GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M.,: A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12 (2023) 9-22. https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., (2023), A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12: 9-22. https://www.ijisc.com Citation Format :