MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C., ARSENE, L., DINCĂ, G. (2015). Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4(2), 73-85. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 2015. Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4(2), 73-85. Available from: https://www.ijisc.comM.C. ŞCHEAU, L. ARSENE, G. DINCĂ, "Infection Vectors – Risk Factors for Financial Transactions," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 73-85, 2015. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 'Infection Vectors – Risk Factors for Financial Transactions', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 73-85, (2015).ŞCHEAU, M.C., ARSENE, L., DINCĂ, G.: Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4 (2015) 73-85. https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., (2015), Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4: 73-85. https://www.ijisc.com Citation Format :
PATIL, D.R., PATIL, J.B. (2016). Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5(2), 57-70. Retrieve from https://www.ijisc.comPATIL, D.R., PATIL, J.B., 2016. Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5(2), 57-70. Available from: https://www.ijisc.comD.R. PATIL, J.B. PATIL, "Malicious Web Pages Detection Using Static Analysis of URLs," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 57-70, 2016. Available: https://www.ijisc.comPATIL, D.R., PATIL, J.B., 'Malicious Web Pages Detection Using Static Analysis of URLs', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 57-70, (2016).PATIL, D.R., PATIL, J.B.: Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5 (2016) 57-70. https://www.ijisc.comPATIL, D.R., PATIL, J.B., (2016), Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5: 57-70. https://www.ijisc.com Citation Format :
SUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K. (2017). Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6(1), 67-72. Retrieve from https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 2017. Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6(1), 67-72. Available from: https://www.ijisc.comS.O. SUBAIRU, A.O. ISAH, J.K. ALHASSAN, "Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 67-72, 2017. Available: https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 'Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 67-72, (2017).SUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K.: Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6 (2017) 67-72. https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., (2017), Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6: 67-72. https://www.ijisc.com Citation Format :