IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • « Previous Entries

    Articles that contain the tag "information security"

    Access Rights Analysis in Microsoft Windows and Linux Operating Systems

    Author(s): BACIVAROV, Ioan; MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.01.01
    Pages: 8-14
    AbstractPlus | Quick view | Full article | Citations


    Penetration Tests on Virtual Environment

    Author(s): MIHAI, Ioan-Cosmin
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2012.01.04
    Pages: 37-45
    AbstractPlus | Quick view | Full article | Citations


    Security Solutions for Informatics Systems

    Author(s): GEANĂ, Ionuţ Cătălin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2012.02.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations


    Online Transactions Security in Internet Banking and e-Commerce

    Author(s): ILIE, Roxana-Corina
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.01.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations


    Comparative Study between Traditional Security and Survivability

    Author(s): MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.01.04
    Pages: 35-42
    AbstractPlus | Quick view | Full article | Citations


    Encryption in Mobile Communications. ZUC Algorithm.

    Author(s): IANCU, Laura; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Security Standards Analysis

    Author(s): MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.03
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Buffer Overflow Vulnerability Exploitation Using Open-Source Tools

    Author(s): BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.05
    Pages: 43-54
    AbstractPlus | Quick view | Full article | Citations


    Legislative Aspects of Cybersecurity

    Author(s): PEȚA, Cezar
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.06
    Pages: 55-60
    AbstractPlus | Quick view | Full article | Citations


    Information Security Analyst Profile

    Author(s): BARBU, Ionuț-Daniel; PASCARIU, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.01.03
    Pages: 29-36
    AbstractPlus | Quick view | Full article | Citations


    A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO

    Author(s): PASĂRE, Alice-Lavinia; CIUCHI, Costel; BOTAN, Cristian
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2014.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Cybersecurity in Cloud Computing Context

    Author(s): OANCEA, Cristian-Vlad
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2014.02.05
    Pages: 43-48
    AbstractPlus | Quick view | Full article | Citations


    SQL Injection Testing in Web Applications Using SQLmap

    Author(s): AXINTE, Sabina-Daniela
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2014.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    New Challenges for Cybersecurity and Possible Criminal Law

    Author(s): DOBRINOIU, Maxim
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.02
    Pages: 15-21
    AbstractPlus | Quick view | Full article | Citations


    The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation

    Author(s): DOGARU, Olguţa
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2015.01.03
    Pages: 22-26
    AbstractPlus | Quick view | Full article | Citations


    Cyber Security Strategies – an Overview

    Author(s): MARTIN, Ioana
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.05
    Pages: 33-40
    AbstractPlus | Quick view | Full article | Citations


    Defense in Depth Principle to Ensure Information Security

    Author(s): BARBU, Ionuț-Daniel; PETRICĂ, Gabriel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2015.01.06
    Pages: 41-46
    AbstractPlus | Quick view | Full article | Citations


    Artificial Intelligence Role in Cybersecurity Infrastructures

    Author(s): OANCEA, Cristian-Vlad
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2015.01.08
    Pages: 59-62
    AbstractPlus | Quick view | Full article | Citations


    Security Challenges for Software Development Companies

    Author(s): AXINTE, Sabina-Daniela
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.02.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations


    Information Security Aspects of Business Continuity Management

    Author(s): ALEXANDRU, Alice-Cristiana
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2016.02.02
    Pages: 17-24
    AbstractPlus | Quick view | Full article | Citations