BĂDESCU, C.M. (2012). Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1(1), 26-34. Retrieve from https://www.ijisc.comBĂDESCU, C.M., 2012. Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1(1), 26-34. Available from: https://www.ijisc.comC.M. BĂDESCU, "Solutions for Securing Computer Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 26-34, 2012. Available: https://www.ijisc.comBĂDESCU, C.M., 'Solutions for Securing Computer Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 26-34, (2012).BĂDESCU, C.M.: Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1 (2012) 26-34. https://www.ijisc.comBĂDESCU, C.M., (2012), Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1: 26-34. https://www.ijisc.com Citation Format :
BĂNUȚĂ, B.A. (2012). Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1(2), 9-16. Retrieve from https://www.ijisc.comBĂNUȚĂ, B.A., 2012. Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1(2), 9-16. Available from: https://www.ijisc.comB.A. BĂNUȚĂ, "Security Technologies Implemented in MPLS VPN Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012. Available: https://www.ijisc.comBĂNUȚĂ, B.A., 'Security Technologies Implemented in MPLS VPN Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 9-16, (2012).BĂNUȚĂ, B.A.: Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1 (2012) 9-16. https://www.ijisc.comBĂNUȚĂ, B.A., (2012), Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1: 9-16. https://www.ijisc.com Citation Format :
COSTEA, I. (2012). Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1(2), 40-47. Retrieve from https://www.ijisc.comCOSTEA, I., 2012. Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1(2), 40-47. Available from: https://www.ijisc.comI. COSTEA, "Data Privacy Assurance in Virtual Private Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 40-47, 2012. Available: https://www.ijisc.comCOSTEA, I., 'Data Privacy Assurance in Virtual Private Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 40-47, (2012).COSTEA, I.: Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1 (2012) 40-47. https://www.ijisc.comCOSTEA, I., (2012), Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1: 40-47. https://www.ijisc.com Citation Format :
IANCU, L. (2012). An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1(2), 48-57. Retrieve from https://www.ijisc.comIANCU, L., 2012. An Overview of LTE Security. International Journal of Information Security and Cybercrime 1(2), 48-57. Available from: https://www.ijisc.comL. IANCU, "An Overview of LTE Security," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 48-57, 2012. Available: https://www.ijisc.comIANCU, L., 'An Overview of LTE Security', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 48-57, (2012).IANCU, L.: An Overview of LTE Security. International Journal of Information Security and Cybercrime 1 (2012) 48-57. https://www.ijisc.comIANCU, L., (2012), An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1: 48-57. https://www.ijisc.com Citation Format :
SEREȚEANU, A. (2013). Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2(1), 17-24. Retrieve from https://www.ijisc.comSEREȚEANU, A., 2013. Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2(1), 17-24. Available from: https://www.ijisc.comA. SEREȚEANU, "Security in Most Recent Generation of Mobile Telecommunication Networks – LTE," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 17-24, 2013. Available: https://www.ijisc.comSEREȚEANU, A., 'Security in Most Recent Generation of Mobile Telecommunication Networks – LTE', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 17-24, (2013).SEREȚEANU, A.: Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime 2 (2013) 17-24. https://www.ijisc.comSEREȚEANU, A., (2013), Security in Most Recent Generation of Mobile Telecommunication Networks – LTE. International Journal of Information Security and Cybercrime, 2: 17-24. https://www.ijisc.com Citation Format :
GRIGORAȘ, A. (2013). The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2(1), 25-34. Retrieve from https://www.ijisc.comGRIGORAȘ, A., 2013. The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2(1), 25-34. Available from: https://www.ijisc.comA. GRIGORAȘ, "The Security of Cloud Networks," International Journal of Information Security and Cybercrime, vol. 2, no. 1, pp. 25-34, 2013. Available: https://www.ijisc.comGRIGORAȘ, A., 'The Security of Cloud Networks', International Journal of Information Security and Cybercrime, vol. 2, no. 1, 25-34, (2013).GRIGORAȘ, A.: The Security of Cloud Networks. International Journal of Information Security and Cybercrime 2 (2013) 25-34. https://www.ijisc.comGRIGORAȘ, A., (2013), The Security of Cloud Networks. International Journal of Information Security and Cybercrime, 2: 25-34. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2013). Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2(2), 61-68. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2013. Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2(2), 61-68. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (I). Types of Attacks," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 61-68, 2013. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (I). Types of Attacks', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 61-68, (2013).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2 (2013) 61-68. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2013), Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2: 61-68. https://www.ijisc.com Citation Format :
BARBU, I.D.,PASCARIU, C., (2014). Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3(1), 29-36. Retrieve from https://www.ijisc.comBARBU, I.D., PASCARIU, C., 2014. Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3(1), 29-36. Available from: https://www.ijisc.comI.D. BARBU, C. PASCARIU, "Information Security Analyst Profile," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 29-36, 2014. Available: https://www.ijisc.comBARBU, I.D., PASCARIU, C., 'Information Security Analyst Profile', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 29-36, (2014).BARBU, I.D.,PASCARIU, C.,: Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comBARBU, I.D., PASCARIU, C., (2014), Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2014). Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3(1), 37-46. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2014. Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3(1), 37-46. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (II). Security Assurance," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 37-46, 2014. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (II). Security Assurance', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 37-46, (2014).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3 (2014) 37-46. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2014), Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3: 37-46. https://www.ijisc.com Citation Format :
HAMED, E.M.,SEDKY, M.H., (2016). A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime, 5(1), 11-31. Retrieve from https://www.ijisc.comHAMED, E.M., SEDKY, M.H., 2016. A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime 5(1), 11-31. Available from: https://www.ijisc.comE.M. HAMED, M.H. SEDKY, "A High Secured, Cost Effectively E-Voting System," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 11-31, 2016. Available: https://www.ijisc.comHAMED, E.M., SEDKY, M.H., 'A High Secured, Cost Effectively E-Voting System', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 11-31, (2016).HAMED, E.M.,SEDKY, M.H.,: A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime 5 (2016) 11-31. https://www.ijisc.comHAMED, E.M., SEDKY, M.H., (2016), A High Secured, Cost Effectively E-Voting System. International Journal of Information Security and Cybercrime, 5: 11-31. https://www.ijisc.com Citation Format :
CERNOV, A.M. (2018). Security in Computer Networks. International Journal of Information Security and Cybercrime, 7(1), 45-52. Retrieve from https://www.ijisc.comCERNOV, A.M., 2018. Security in Computer Networks. International Journal of Information Security and Cybercrime 7(1), 45-52. Available from: https://www.ijisc.comA.M. CERNOV, "Security in Computer Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 45-52, 2018. Available: https://www.ijisc.comCERNOV, A.M., 'Security in Computer Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 45-52, (2018).CERNOV, A.M.: Security in Computer Networks. International Journal of Information Security and Cybercrime 7 (2018) 45-52. https://www.ijisc.comCERNOV, A.M., (2018), Security in Computer Networks. International Journal of Information Security and Cybercrime, 7: 45-52. https://www.ijisc.com Citation Format :
MAREȘ, M.S. (2018). Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7(2), 41-51. Retrieve from https://www.ijisc.comMAREȘ, M.S., 2018. Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7(2), 41-51. Available from: https://www.ijisc.comM.S. MAREȘ, "Solutions to Secure a Network," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 41-51, 2018. Available: https://www.ijisc.comMAREȘ, M.S., 'Solutions to Secure a Network', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 41-51, (2018).MAREȘ, M.S.: Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7 (2018) 41-51. https://www.ijisc.comMAREȘ, M.S., (2018), Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7: 41-51. https://www.ijisc.com Citation Format :
BALABAN, I. (2021). Denial-of-Service Attack. International Journal of Information Security and Cybercrime, 10(1), 59-64. Retrieve from https://www.ijisc.comBALABAN, I., 2021. Denial-of-Service Attack. International Journal of Information Security and Cybercrime 10(1), 59-64. Available from: https://www.ijisc.comI. BALABAN, "Denial-of-Service Attack," International Journal of Information Security and Cybercrime, vol. 10, no. 1, pp. 59-64, 2021. Available: https://www.ijisc.comBALABAN, I., 'Denial-of-Service Attack', International Journal of Information Security and Cybercrime, vol. 10, no. 1, 59-64, (2021).BALABAN, I.: Denial-of-Service Attack. International Journal of Information Security and Cybercrime 10 (2021) 59-64. https://www.ijisc.comBALABAN, I., (2021), Denial-of-Service Attack. International Journal of Information Security and Cybercrime, 10: 59-64. https://www.ijisc.com Citation Format :