SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P., (2014). An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3(1), 17-28. Retrieve from https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 2014. An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3(1), 17-28. Available from: https://www.ijisc.comP.K. SINGH, O.P. SANGWAN, A. PRATAP, A.P. SINGH, "An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 17-28, 2014. Available: https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 'An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 17-28, (2014).SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P.,: An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3 (2014) 17-28. https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., (2014), An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3: 17-28. https://www.ijisc.com Citation Format :
SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P., (2014). An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3(2), 19-28. Retrieve from https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 2014. An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3(2), 19-28. Available from: https://www.ijisc.comP.K. SINGH, O.P. SANGWAN, A. PRATAP, A.P. SINGH, "An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 19-28, 2014. Available: https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 'An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 19-28, (2014).SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P.,: An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3 (2014) 19-28. https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., (2014), An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3: 19-28. https://www.ijisc.com Citation Format :
BHARDWAJ, A.,PANDEY, K.,CHOPRA, R., (2016). Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime, 5(1), 32-44. Retrieve from https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., 2016. Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime 5(1), 32-44. Available from: https://www.ijisc.comA. BHARDWAJ, K. PANDEY, R. CHOPRA, "Android and iOS Security – An Analysis and Comparison Report," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 32-44, 2016. Available: https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., 'Android and iOS Security – An Analysis and Comparison Report', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 32-44, (2016).BHARDWAJ, A.,PANDEY, K.,CHOPRA, R.,: Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime 5 (2016) 32-44. https://www.ijisc.comBHARDWAJ, A., PANDEY, K., CHOPRA, R., (2016), Android and iOS Security – An Analysis and Comparison Report. International Journal of Information Security and Cybercrime, 5: 32-44. https://www.ijisc.com Citation Format :
GANAR, R.P.,ARDHAPURKAR, S.B., (2016). Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime, 5(1), 61-68. Retrieve from https://www.ijisc.comGANAR, R.P., ARDHAPURKAR, S.B., 2016. Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime 5(1), 61-68. Available from: https://www.ijisc.comR.P. GANAR, S.B. ARDHAPURKAR, "Exploiting Social Network for Forensic Analysis to Predict Civil Unrest," International Journal of Information Security and Cybercrime, vol. 5, no. 1, pp. 61-68, 2016. Available: https://www.ijisc.comGANAR, R.P., ARDHAPURKAR, S.B., 'Exploiting Social Network for Forensic Analysis to Predict Civil Unrest', International Journal of Information Security and Cybercrime, vol. 5, no. 1, 61-68, (2016).GANAR, R.P.,ARDHAPURKAR, S.B.,: Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime 5 (2016) 61-68. https://www.ijisc.comGANAR, R.P., ARDHAPURKAR, S.B., (2016), Exploiting Social Network for Forensic Analysis to Predict Civil Unrest. International Journal of Information Security and Cybercrime, 5: 61-68. https://www.ijisc.com Citation Format :