VOICU, M. (2012). LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1(1), 19-25. Retrieve from https://www.ijisc.comVOICU, M., 2012. LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1(1), 19-25. Available from: https://www.ijisc.comM. VOICU, "LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 19-25, 2012. Available: https://www.ijisc.comVOICU, M., 'LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 19-25, (2012).VOICU, M.: LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1 (2012) 19-25. https://www.ijisc.comVOICU, M., (2012), LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1: 19-25. https://www.ijisc.com Citation Format :
SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P., (2014). An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3(2), 19-28. Retrieve from https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 2014. An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3(2), 19-28. Available from: https://www.ijisc.comP.K. SINGH, O.P. SANGWAN, A. PRATAP, A.P. SINGH, "An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 19-28, 2014. Available: https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 'An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 19-28, (2014).SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P.,: An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3 (2014) 19-28. https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., (2014), An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3: 19-28. https://www.ijisc.com Citation Format :
BĂDIŢĂ, A.G. (2017). The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6(2), 17-22. Retrieve from https://www.ijisc.comBĂDIŢĂ, A.G., 2017. The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6(2), 17-22. Available from: https://www.ijisc.comA.G. BĂDIŢĂ, "The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 17-22, 2017. Available: https://www.ijisc.comBĂDIŢĂ, A.G., 'The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 17-22, (2017).BĂDIŢĂ, A.G.: The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6 (2017) 17-22. https://www.ijisc.comBĂDIŢĂ, A.G., (2017), The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6: 17-22. https://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: https://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. https://www.ijisc.com Citation Format :
VLAD, I.M. (2018). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7(2), 14-24. Retrieve from https://www.ijisc.comVLAD, I.M., 2018. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7(2), 14-24. Available from: https://www.ijisc.comI.M. VLAD, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 14-24, 2018. Available: https://www.ijisc.comVLAD, I.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 14-24, (2018).VLAD, I.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7 (2018) 14-24. https://www.ijisc.comVLAD, I.M., (2018), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7: 14-24. https://www.ijisc.com Citation Format :
ENNS-BRAY, W.S.,ROCHAT, K., (2020). Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime, 9(2), 12-17. Retrieve from https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., 2020. Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime 9(2), 12-17. Available from: https://www.ijisc.comW.S. ENNS-BRAY, K. ROCHAT, "Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 12-17, 2020. Available: https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., 'Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 12-17, (2020).ENNS-BRAY, W.S.,ROCHAT, K.,: Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime 9 (2020) 12-17. https://www.ijisc.comENNS-BRAY, W.S., ROCHAT, K., (2020), Medical Device Regulation and Cybersecurity: Achieving ‘Secure by Design’ for Regulatory Compliance. International Journal of Information Security and Cybercrime, 9: 12-17. https://www.ijisc.com Citation Format :
CHATTAMVELLI, R. (2022). A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11(1), 49-58. Retrieve from https://www.ijisc.comCHATTAMVELLI, R., 2022. A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11(1), 49-58. Available from: https://www.ijisc.comR. CHATTAMVELLI, "A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 49-58, 2022. Available: https://www.ijisc.comCHATTAMVELLI, R., 'A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 49-58, (2022).CHATTAMVELLI, R.: A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11 (2022) 49-58. https://www.ijisc.comCHATTAMVELLI, R., (2022), A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11: 49-58. https://www.ijisc.com Citation Format :
GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M., (2023). A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12(2), 9-22. Retrieve from https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 2023. A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12(2), 9-22. Available from: https://www.ijisc.comT.A. GIWA, O.I. ABIODUN, A.E. OMOLARA, R.M. ISIAKA, "A Hybridized Honey Encryption for Data Security using Residue Number System," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 9-22, 2023. Available: https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 'A Hybridized Honey Encryption for Data Security using Residue Number System', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 9-22, (2023).GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M.,: A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12 (2023) 9-22. https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., (2023), A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12: 9-22. https://www.ijisc.com Citation Format :
POPESCU, E.E. (2024). VoIP Security Threats. International Journal of Information Security and Cybercrime, 13(1), 66-70. Retrieve from https://www.ijisc.comPOPESCU, E.E., 2024. VoIP Security Threats. International Journal of Information Security and Cybercrime 13(1), 66-70. Available from: https://www.ijisc.comE.E. POPESCU, "VoIP Security Threats," International Journal of Information Security and Cybercrime, vol. 13, no. 1, pp. 66-70, 2024. Available: https://www.ijisc.comPOPESCU, E.E., 'VoIP Security Threats', International Journal of Information Security and Cybercrime, vol. 13, no. 1, 66-70, (2024).POPESCU, E.E.: VoIP Security Threats. International Journal of Information Security and Cybercrime 13 (2024) 66-70. https://www.ijisc.comPOPESCU, E.E., (2024), VoIP Security Threats. International Journal of Information Security and Cybercrime, 13: 66-70. https://www.ijisc.com Citation Format :