BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :
GHERGHINA, C. (2012). Cyberterrorism. International Journal of Information Security and Cybercrime, 1(2), 33-39. Retrieve from https://www.ijisc.comGHERGHINA, C., 2012. Cyberterrorism. International Journal of Information Security and Cybercrime 1(2), 33-39. Available from: https://www.ijisc.comC. GHERGHINA, "Cyberterrorism," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 33-39, 2012. Available: https://www.ijisc.comGHERGHINA, C., 'Cyberterrorism', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 33-39, (2012).GHERGHINA, C.: Cyberterrorism. International Journal of Information Security and Cybercrime 1 (2012) 33-39. https://www.ijisc.comGHERGHINA, C., (2012), Cyberterrorism. International Journal of Information Security and Cybercrime, 1: 33-39. https://www.ijisc.com Citation Format :
BARBU, I.D. (2013). Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2(2), 43-54. Retrieve from https://www.ijisc.comBARBU, I.D., 2013. Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2(2), 43-54. Available from: https://www.ijisc.comI.D. BARBU, "Buffer Overflow Vulnerability Exploitation Using Open-Source Tools," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 43-54, 2013. Available: https://www.ijisc.comBARBU, I.D., 'Buffer Overflow Vulnerability Exploitation Using Open-Source Tools', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 43-54, (2013).BARBU, I.D.: Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2 (2013) 43-54. https://www.ijisc.comBARBU, I.D., (2013), Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2: 43-54. https://www.ijisc.com Citation Format :
BARBU, I.D.,BACIVAROV, I., (2014). Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3(2), 49-60. Retrieve from https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 2014. Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3(2), 49-60. Available from: https://www.ijisc.comI.D. BARBU, I. BACIVAROV, "Heartbleed – The Vulnerability That Changed the Internet," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 49-60, 2014. Available: https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 'Heartbleed – The Vulnerability That Changed the Internet', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 49-60, (2014).BARBU, I.D.,BACIVAROV, I.,: Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3 (2014) 49-60. https://www.ijisc.comBARBU, I.D., BACIVAROV, I., (2014), Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3: 49-60. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G., (2015). Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4(2), 73-85. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 2015. Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4(2), 73-85. Available from: https://www.ijisc.comM.C. ŞCHEAU, L. ARSENE, G. DINCĂ, "Infection Vectors – Risk Factors for Financial Transactions," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 73-85, 2015. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 'Infection Vectors – Risk Factors for Financial Transactions', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 73-85, (2015).ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G.,: Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4 (2015) 73-85. https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., (2015), Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4: 73-85. https://www.ijisc.com Citation Format :
BEŞLIU, D.C. (2017). Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6(2), 35-39. Retrieve from https://www.ijisc.comBEŞLIU, D.C., 2017. Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6(2), 35-39. Available from: https://www.ijisc.comD.C. BEŞLIU, "Cyber Terrorism – A Growing Threat in the Field of Cyber Security," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 35-39, 2017. Available: https://www.ijisc.comBEŞLIU, D.C., 'Cyber Terrorism – A Growing Threat in the Field of Cyber Security', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 35-39, (2017).BEŞLIU, D.C.: Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6 (2017) 35-39. https://www.ijisc.comBEŞLIU, D.C., (2017), Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6: 35-39. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :
CRĂCIUN, A.M. (2018). Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7(1), 23-31. Retrieve from https://www.ijisc.comCRĂCIUN, A.M., 2018. Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7(1), 23-31. Available from: https://www.ijisc.comA.M. CRĂCIUN, "Threats and Risks to Telecommunications Systems," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 23-31, 2018. Available: https://www.ijisc.comCRĂCIUN, A.M., 'Threats and Risks to Telecommunications Systems', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 23-31, (2018).CRĂCIUN, A.M.: Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7 (2018) 23-31. https://www.ijisc.comCRĂCIUN, A.M., (2018), Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7: 23-31. https://www.ijisc.com Citation Format :
POPESCU, I. (2018). The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7(2), 25-32. Retrieve from https://www.ijisc.comPOPESCU, I., 2018. The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7(2), 25-32. Available from: https://www.ijisc.comI. POPESCU, "The Influence of Vulnerabilities on the Information Systems and Methods of Prevention," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 25-32, 2018. Available: https://www.ijisc.comPOPESCU, I., 'The Influence of Vulnerabilities on the Information Systems and Methods of Prevention', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 25-32, (2018).POPESCU, I.: The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7 (2018) 25-32. https://www.ijisc.comPOPESCU, I., (2018), The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7: 25-32. https://www.ijisc.com Citation Format :
BRUMĂ, O.V. (2020). Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime, 9(1), 9-14. Retrieve from https://www.ijisc.comBRUMĂ, O.V., 2020. Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime 9(1), 9-14. Available from: https://www.ijisc.comO.V. BRUMĂ, "Vulnerabilities of Information Systems," International Journal of Information Security and Cybercrime, vol. 9, no. 1, pp. 9-14, 2020. Available: https://www.ijisc.comBRUMĂ, O.V., 'Vulnerabilities of Information Systems', International Journal of Information Security and Cybercrime, vol. 9, no. 1, 9-14, (2020).BRUMĂ, O.V.: Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime 9 (2020) 9-14. https://www.ijisc.comBRUMĂ, O.V., (2020), Vulnerabilities of Information Systems. International Journal of Information Security and Cybercrime, 9: 9-14. https://www.ijisc.com Citation Format :
PASCARIU, C. (2022). Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime, 11(1), 25-30. Retrieve from https://www.ijisc.comPASCARIU, C., 2022. Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime 11(1), 25-30. Available from: https://www.ijisc.comC. PASCARIU, "Getting Started with Vulnerability Disclosure and Bug Bounty Programs," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 25-30, 2022. Available: https://www.ijisc.comPASCARIU, C., 'Getting Started with Vulnerability Disclosure and Bug Bounty Programs', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 25-30, (2022).PASCARIU, C.: Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime 11 (2022) 25-30. https://www.ijisc.comPASCARIU, C., (2022), Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime, 11: 25-30. https://www.ijisc.com Citation Format :
MWENDA, A.,NGODYA, D., (2023). A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime, 12(2), 27-34. Retrieve from https://www.ijisc.comMWENDA, A., NGODYA, D., 2023. A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime 12(2), 27-34. Available from: https://www.ijisc.comA. MWENDA, D. NGODYA, "A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter)," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 27-34, 2023. Available: https://www.ijisc.comMWENDA, A., NGODYA, D., 'A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter)', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 27-34, (2023).MWENDA, A.,NGODYA, D.,: A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime 12 (2023) 27-34. https://www.ijisc.comMWENDA, A., NGODYA, D., (2023), A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime, 12: 27-34. https://www.ijisc.com Citation Format :