IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the tag "information security"

    Access Rights Analysis in Microsoft Windows and Linux Operating Systems

    Author(s): BACIVAROV, Ioan; MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.01.01
    Pages: 8-14
    AbstractPlus | Quick view | Full article | Citations


    Penetration Tests on Virtual Environment

    Author(s): MIHAI, Ioan-Cosmin
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.01.04
    Pages: 37-45
    AbstractPlus | Quick view | Full article | Citations


    Security Solutions for Informatics Systems

    Author(s): GEANĂ, Ionuţ Cătălin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.02.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations


    Online Transactions Security in Internet Banking and e-Commerce

    Author(s): ILIE, Roxana-Corina
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.01.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations


    Comparative Study between Traditional Security and Survivability

    Author(s): MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.01.04
    Pages: 35-42
    AbstractPlus | Quick view | Full article | Citations


    Encryption in Mobile Communications. ZUC Algorithm.

    Author(s): IANCU, Laura; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Security Standards Analysis

    Author(s): MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.03
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Buffer Overflow Vulnerability Exploitation Using Open-Source Tools

    Author(s): BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.05
    Pages: 43-54
    AbstractPlus | Quick view | Full article | Citations


    Legislative Aspects of Cybersecurity

    Author(s): PEȚA, Cezar
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.06
    Pages: 55-60
    AbstractPlus | Quick view | Full article | Citations


    Information Security Analyst Profile

    Author(s): BARBU, Ionuț-Daniel; PASCARIU, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.01.03
    Pages: 29-36
    AbstractPlus | Quick view | Full article | Citations


    A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO

    Author(s): PASĂRE, Alice-Lavinia; CIUCHI, Costel; BOTAN, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Cybersecurity in Cloud Computing Context

    Author(s): OANCEA, Cristian-Vlad
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.02.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations


    SQL Injection Testing in Web Applications Using SQLmap

    Author(s): AXINTE, Sabina-Daniela
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    New Challenges for Cybersecurity and Possible Criminal Law

    Author(s): DOBRINOIU, Maxim
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.02
    Pages: 15-21
    AbstractPlus | Quick view | Full article | Citations


    The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation

    Author(s): DOGARU, Olguţa
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.03
    Pages: 22-26
    AbstractPlus | Quick view | Full article | Citations


    Cyber Security Strategies – an Overview

    Author(s): MARTIN, Ioana
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.05
    Pages: 33-40
    AbstractPlus | Quick view | Full article | Citations


    Defense in Depth Principle to Ensure Information Security

    Author(s): BARBU, Ionuț-Daniel; PETRICĂ, Gabriel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.06
    Pages: 41-46
    AbstractPlus | Quick view | Full article | Citations


    Artificial Intelligence Role in Cybersecurity Infrastructures

    Author(s): OANCEA, Cristian-Vlad
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2015.01.08
    Pages: 59-62
    AbstractPlus | Quick view | Full article | Citations


    Security Challenges for Software Development Companies

    Author(s): AXINTE, Sabina-Daniela
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.02.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations


    Information Security Aspects of Business Continuity Management

    Author(s): ALEXANDRU, Alice-Cristiana
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.02.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations