BACIVAROV, I.,MIHAI, I.C., (2012). Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1(1), 8-14. Retrieve from https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 2012. Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1(1), 8-14. Available from: https://www.ijisc.comI. BACIVAROV, I.C. MIHAI, "Access Rights Analysis in Microsoft Windows and Linux Operating Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 8-14, 2012. Available: https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 'Access Rights Analysis in Microsoft Windows and Linux Operating Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 8-14, (2012).BACIVAROV, I.,MIHAI, I.C.,: Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1 (2012) 8-14. https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., (2012), Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1: 8-14. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1(1), 37-45. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1(1), 37-45. Available from: https://www.ijisc.comI.C. MIHAI, "Penetration Tests on Virtual Environment," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 37-45, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Penetration Tests on Virtual Environment', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 37-45, (2012).MIHAI, I.C.: Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1 (2012) 37-45. https://www.ijisc.comMIHAI, I.C., (2012), Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1: 37-45. https://www.ijisc.com Citation Format :
GEANĂ, I.C. (2012). Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1(2), 17-24. Retrieve from https://www.ijisc.comGEANĂ, I.C., 2012. Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1(2), 17-24. Available from: https://www.ijisc.comI.C. GEANĂ, "Security Solutions for Informatics Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 17-24, 2012. Available: https://www.ijisc.comGEANĂ, I.C., 'Security Solutions for Informatics Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 17-24, (2012).GEANĂ, I.C.: Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1 (2012) 17-24. https://www.ijisc.comGEANĂ, I.C., (2012), Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1: 17-24. https://www.ijisc.com Citation Format :
ILIE, R.C. (2013). Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2(1), 9-16. Retrieve from https://www.ijisc.comILIE, R.C., 2013. Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2(1), 9-16. Available from: https://www.ijisc.comR.C. ILIE, "Online Transactions Security in Internet Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 9-16, 2013. Available: https://www.ijisc.comILIE, R.C., 'Online Transactions Security in Internet Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 9-16, (2013).ILIE, R.C.: Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime 2 (2013) 9-16. https://www.ijisc.comILIE, R.C., (2013), Online Transactions Security in Internet Banking and e-Commerce. International Journal of Information Security and Cybercrime, 2: 9-16. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2(1), 35-42. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2(1), 35-42. Available from: https://www.ijisc.comI.C. MIHAI, "Comparative Study between Traditional Security and Survivability," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 35-42, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Comparative Study between Traditional Security and Survivability', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 35-42, (2013).MIHAI, I.C.: Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comMIHAI, I.C., (2013), Comparative Study between Traditional Security and Survivability. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from https://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: https://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: https://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. https://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Security Standards Analysis. International Journal of Information Security and Cybercrime, 2(2), 27-34. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Security Standards Analysis. International Journal of Information Security and Cybercrime 2(2), 27-34. Available from: https://www.ijisc.comI.C. MIHAI, "Security Standards Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 27-34, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Security Standards Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 27-34, (2013).MIHAI, I.C.: Security Standards Analysis. International Journal of Information Security and Cybercrime 2 (2013) 27-34. https://www.ijisc.comMIHAI, I.C., (2013), Security Standards Analysis. International Journal of Information Security and Cybercrime, 2: 27-34. https://www.ijisc.com Citation Format :
BARBU, I.D. (2013). Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2(2), 43-54. Retrieve from https://www.ijisc.comBARBU, I.D., 2013. Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2(2), 43-54. Available from: https://www.ijisc.comI.D. BARBU, "Buffer Overflow Vulnerability Exploitation Using Open-Source Tools," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 43-54, 2013. Available: https://www.ijisc.comBARBU, I.D., 'Buffer Overflow Vulnerability Exploitation Using Open-Source Tools', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 43-54, (2013).BARBU, I.D.: Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2 (2013) 43-54. https://www.ijisc.comBARBU, I.D., (2013), Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2: 43-54. https://www.ijisc.com Citation Format :
PEȚA, C. (2013). Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2(2), 55-60. Retrieve from https://www.ijisc.comPEȚA, C., 2013. Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2(2), 55-60. Available from: https://www.ijisc.comC. PEȚA, "Legislative Aspects of Cybersecurity," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 55-60, 2013. Available: https://www.ijisc.comPEȚA, C., 'Legislative Aspects of Cybersecurity', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 55-60, (2013).PEȚA, C.: Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2 (2013) 55-60. https://www.ijisc.comPEȚA, C., (2013), Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2: 55-60. https://www.ijisc.com Citation Format :
BARBU, I.D.,PASCARIU, C., (2014). Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3(1), 29-36. Retrieve from https://www.ijisc.comBARBU, I.D., PASCARIU, C., 2014. Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3(1), 29-36. Available from: https://www.ijisc.comI.D. BARBU, C. PASCARIU, "Information Security Analyst Profile," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 29-36, 2014. Available: https://www.ijisc.comBARBU, I.D., PASCARIU, C., 'Information Security Analyst Profile', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 29-36, (2014).BARBU, I.D.,PASCARIU, C.,: Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comBARBU, I.D., PASCARIU, C., (2014), Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
PASĂRE, A.L.,CIUCHI, C.,BOTAN, C., (2014). A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3(2), 7-18. Retrieve from https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 2014. A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3(2), 7-18. Available from: https://www.ijisc.comA.L. PASĂRE, C. CIUCHI, C. BOTAN, "A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 7-18, 2014. Available: https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 'A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 7-18, (2014).PASĂRE, A.L.,CIUCHI, C.,BOTAN, C.,: A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3 (2014) 7-18. https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., (2014), A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3: 7-18. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2014). Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3(2), 43-48. Retrieve from https://www.ijisc.comOANCEA, C.V., 2014. Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3(2), 43-48. Available from: https://www.ijisc.comC.V. OANCEA, "Cybersecurity in Cloud Computing Context," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 43-48, 2014. Available: https://www.ijisc.comOANCEA, C.V., 'Cybersecurity in Cloud Computing Context', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 43-48, (2014).OANCEA, C.V.: Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3 (2014) 43-48. https://www.ijisc.comOANCEA, C.V., (2014), Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3: 43-48. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2014). SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3(2), 61-68. Retrieve from https://www.ijisc.comAXINTE, S.D., 2014. SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3(2), 61-68. Available from: https://www.ijisc.comS.D. AXINTE, "SQL Injection Testing in Web Applications Using SQLmap," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 61-68, 2014. Available: https://www.ijisc.comAXINTE, S.D., 'SQL Injection Testing in Web Applications Using SQLmap', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 61-68, (2014).AXINTE, S.D.: SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3 (2014) 61-68. https://www.ijisc.comAXINTE, S.D., (2014), SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3: 61-68. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2015). New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4(1), 15-21. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2015. New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4(1), 15-21. Available from: https://www.ijisc.comM. DOBRINOIU, "New Challenges for Cybersecurity and Possible Criminal Law," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 15-21, 2015. Available: https://www.ijisc.comDOBRINOIU, M., 'New Challenges for Cybersecurity and Possible Criminal Law', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 15-21, (2015).DOBRINOIU, M.: New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4 (2015) 15-21. https://www.ijisc.comDOBRINOIU, M., (2015), New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4: 15-21. https://www.ijisc.com Citation Format :
DOGARU, O. (2015). The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime, 4(1), 22-26. Retrieve from https://www.ijisc.comDOGARU, O., 2015. The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime 4(1), 22-26. Available from: https://www.ijisc.comO. DOGARU, "The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 22-26, 2015. Available: https://www.ijisc.comDOGARU, O., 'The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 22-26, (2015).DOGARU, O.: The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime 4 (2015) 22-26. https://www.ijisc.comDOGARU, O., (2015), The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime, 4: 22-26. https://www.ijisc.com Citation Format :
MARTIN, I. (2015). Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4(1), 33-40. Retrieve from https://www.ijisc.comMARTIN, I., 2015. Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4(1), 33-40. Available from: https://www.ijisc.comI. MARTIN, "Cyber Security Strategies – an Overview," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 33-40, 2015. Available: https://www.ijisc.comMARTIN, I., 'Cyber Security Strategies – an Overview', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 33-40, (2015).MARTIN, I.: Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4 (2015) 33-40. https://www.ijisc.comMARTIN, I., (2015), Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4: 33-40. https://www.ijisc.com Citation Format :
BARBU, I.D.,PETRICĂ, G., (2015). Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4(1), 41-46. Retrieve from https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 2015. Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4(1), 41-46. Available from: https://www.ijisc.comI.D. BARBU, G. PETRICĂ, "Defense in Depth Principle to Ensure Information Security," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 41-46, 2015. Available: https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 'Defense in Depth Principle to Ensure Information Security', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 41-46, (2015).BARBU, I.D.,PETRICĂ, G.,: Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4 (2015) 41-46. https://www.ijisc.comBARBU, I.D., PETRICĂ, G., (2015), Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4: 41-46. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2015). Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4(1), 59-62. Retrieve from https://www.ijisc.comOANCEA, C.V., 2015. Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4(1), 59-62. Available from: https://www.ijisc.comC.V. OANCEA, "Artificial Intelligence Role in Cybersecurity Infrastructures," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 59-62, 2015. Available: https://www.ijisc.comOANCEA, C.V., 'Artificial Intelligence Role in Cybersecurity Infrastructures', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 59-62, (2015).OANCEA, C.V.: Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4 (2015) 59-62. https://www.ijisc.comOANCEA, C.V., (2015), Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4: 59-62. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2016). Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5(2), 9-16. Retrieve from https://www.ijisc.comAXINTE, S.D., 2016. Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5(2), 9-16. Available from: https://www.ijisc.comS.D. AXINTE, "Security Challenges for Software Development Companies," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 9-16, 2016. Available: https://www.ijisc.comAXINTE, S.D., 'Security Challenges for Software Development Companies', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 9-16, (2016).AXINTE, S.D.: Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5 (2016) 9-16. https://www.ijisc.comAXINTE, S.D., (2016), Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5: 9-16. https://www.ijisc.com Citation Format :
ALEXANDRU, A.C. (2016). Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5(2), 17-24. Retrieve from https://www.ijisc.comALEXANDRU, A.C., 2016. Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5(2), 17-24. Available from: https://www.ijisc.comA.C. ALEXANDRU, "Information Security Aspects of Business Continuity Management," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 17-24, 2016. Available: https://www.ijisc.comALEXANDRU, A.C., 'Information Security Aspects of Business Continuity Management', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 17-24, (2016).ALEXANDRU, A.C.: Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5 (2016) 17-24. https://www.ijisc.comALEXANDRU, A.C., (2016), Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5: 17-24. https://www.ijisc.com Citation Format :