BURDESCU, A.M. (2021). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 10(1), 51-58. Retrieve from https://www.ijisc.comBURDESCU, A.M., 2021. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 10(1), 51-58. Available from: https://www.ijisc.comA.M. BURDESCU, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 51-58, 2021. Available: https://www.ijisc.comBURDESCU, A.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 51-58, (2021).BURDESCU, A.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 10 (2021) 51-58. https://www.ijisc.comBURDESCU, A.M., (2021), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 10: 51-58. https://www.ijisc.com Citation Format :
AHUBELE, B.,UGBARI, A., (2022). Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11(1), 31-40. Retrieve from https://www.ijisc.comAHUBELE, B., UGBARI, A., 2022. Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11(1), 31-40. Available from: https://www.ijisc.comB. AHUBELE, A. UGBARI, "Data Protection for Users in Cloud Computing," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 31-40, 2022. Available: https://www.ijisc.comAHUBELE, B., UGBARI, A., 'Data Protection for Users in Cloud Computing', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 31-40, (2022).AHUBELE, B.,UGBARI, A.,: Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11 (2022) 31-40. https://www.ijisc.comAHUBELE, B., UGBARI, A., (2022), Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11: 31-40. https://www.ijisc.com Citation Format :