MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G., (2015). Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4(2), 73-85. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 2015. Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4(2), 73-85. Available from: https://www.ijisc.comM.C. ŞCHEAU, L. ARSENE, G. DINCĂ, "Infection Vectors – Risk Factors for Financial Transactions," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 73-85, 2015. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 'Infection Vectors – Risk Factors for Financial Transactions', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 73-85, (2015).ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G.,: Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4 (2015) 73-85. https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., (2015), Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4: 73-85. https://www.ijisc.com Citation Format :
PATIL, D.R.,PATIL, J.B., (2016). Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5(2), 57-70. Retrieve from https://www.ijisc.comPATIL, D.R., PATIL, J.B., 2016. Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5(2), 57-70. Available from: https://www.ijisc.comD.R. PATIL, J.B. PATIL, "Malicious Web Pages Detection Using Static Analysis of URLs," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 57-70, 2016. Available: https://www.ijisc.comPATIL, D.R., PATIL, J.B., 'Malicious Web Pages Detection Using Static Analysis of URLs', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 57-70, (2016).PATIL, D.R.,PATIL, J.B.,: Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5 (2016) 57-70. https://www.ijisc.comPATIL, D.R., PATIL, J.B., (2016), Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5: 57-70. https://www.ijisc.com Citation Format :
SUBAIRU, S.O.,ISAH, A.O.,ALHASSAN, J.K., (2017). Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6(1), 67-72. Retrieve from https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 2017. Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6(1), 67-72. Available from: https://www.ijisc.comS.O. SUBAIRU, A.O. ISAH, J.K. ALHASSAN, "Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 67-72, 2017. Available: https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 'Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 67-72, (2017).SUBAIRU, S.O.,ISAH, A.O.,ALHASSAN, J.K.,: Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6 (2017) 67-72. https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., (2017), Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6: 67-72. https://www.ijisc.com Citation Format :
PARASCHIVA, I. (2019). WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime, 8(1), 65-72. Retrieve from https://www.ijisc.comPARASCHIVA, I., 2019. WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime 8(1), 65-72. Available from: https://www.ijisc.comI. PARASCHIVA, "WannaCry Ransomware Attack from Romanian Police Perspective," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 65-72, 2019. Available: https://www.ijisc.comPARASCHIVA, I., 'WannaCry Ransomware Attack from Romanian Police Perspective', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 65-72, (2019).PARASCHIVA, I.: WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime 8 (2019) 65-72. https://www.ijisc.comPARASCHIVA, I., (2019), WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime, 8: 65-72. https://www.ijisc.com Citation Format :
FRĂȚILĂ, A.I. (2020). Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9(2), 38-45. Retrieve from https://www.ijisc.comFRĂȚILĂ, A.I., 2020. Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9(2), 38-45. Available from: https://www.ijisc.comA.I. FRĂȚILĂ, "Analysis of Computer Malware and Common Attacks," International Journal of Information Security and Cybercrime, vol. 9, no. 2, pp. 38-45, 2020. Available: https://www.ijisc.comFRĂȚILĂ, A.I., 'Analysis of Computer Malware and Common Attacks', International Journal of Information Security and Cybercrime, vol. 9, no. 2, 38-45, (2020).FRĂȚILĂ, A.I.: Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime 9 (2020) 38-45. https://www.ijisc.comFRĂȚILĂ, A.I., (2020), Analysis of Computer Malware and Common Attacks. International Journal of Information Security and Cybercrime, 9: 38-45. https://www.ijisc.com Citation Format :