BACIVAROV, I.,MIHAI, I.C., (2012). Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1(1), 8-14. Retrieve from https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 2012. Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1(1), 8-14. Available from: https://www.ijisc.comI. BACIVAROV, I.C. MIHAI, "Access Rights Analysis in Microsoft Windows and Linux Operating Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 8-14, 2012. Available: https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., 'Access Rights Analysis in Microsoft Windows and Linux Operating Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 8-14, (2012).BACIVAROV, I.,MIHAI, I.C.,: Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime 1 (2012) 8-14. https://www.ijisc.comBACIVAROV, I., MIHAI, I.C., (2012), Access Rights Analysis in Microsoft Windows and Linux Operating Systems. International Journal of Information Security and Cybercrime, 1: 8-14. https://www.ijisc.com Citation Format :
VOICU, M. (2012). LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1(1), 19-25. Retrieve from https://www.ijisc.comVOICU, M., 2012. LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1(1), 19-25. Available from: https://www.ijisc.comM. VOICU, "LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 19-25, 2012. Available: https://www.ijisc.comVOICU, M., 'LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 19-25, (2012).VOICU, M.: LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime 1 (2012) 19-25. https://www.ijisc.comVOICU, M., (2012), LTE Data Security: UE Mobile Terminal Authentication and Encryption on Radio Interface with E-UTRAN. International Journal of Information Security and Cybercrime, 1: 19-25. https://www.ijisc.com Citation Format :
BĂDESCU, C.M. (2012). Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1(1), 26-34. Retrieve from https://www.ijisc.comBĂDESCU, C.M., 2012. Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1(1), 26-34. Available from: https://www.ijisc.comC.M. BĂDESCU, "Solutions for Securing Computer Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 26-34, 2012. Available: https://www.ijisc.comBĂDESCU, C.M., 'Solutions for Securing Computer Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 26-34, (2012).BĂDESCU, C.M.: Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime 1 (2012) 26-34. https://www.ijisc.comBĂDESCU, C.M., (2012), Solutions for Securing Computer Networks. International Journal of Information Security and Cybercrime, 1: 26-34. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1(1), 37-45. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1(1), 37-45. Available from: https://www.ijisc.comI.C. MIHAI, "Penetration Tests on Virtual Environment," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 37-45, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Penetration Tests on Virtual Environment', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 37-45, (2012).MIHAI, I.C.: Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime 1 (2012) 37-45. https://www.ijisc.comMIHAI, I.C., (2012), Penetration Tests on Virtual Environment. International Journal of Information Security and Cybercrime, 1: 37-45. https://www.ijisc.com Citation Format :
TRIFAN, M. (2012). Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1(1), 46-54. Retrieve from https://www.ijisc.comTRIFAN, M., 2012. Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1(1), 46-54. Available from: https://www.ijisc.comM. TRIFAN, "Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 46-54, 2012. Available: https://www.ijisc.comTRIFAN, M., 'Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 46-54, (2012).TRIFAN, M.: Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime 1 (2012) 46-54. https://www.ijisc.comTRIFAN, M., (2012), Cyber-Attacks (Viruses, Trojan Horses and Computer Worms) Analysis. International Journal of Information Security and Cybercrime, 1: 46-54. https://www.ijisc.com Citation Format :
BARBU, I.D. (2012). Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1(1), 55-65. Retrieve from https://www.ijisc.comBARBU, I.D., 2012. Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1(1), 55-65. Available from: https://www.ijisc.comI.D. BARBU, "Computer Systems Vulnerabilities," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 55-65, 2012. Available: https://www.ijisc.comBARBU, I.D., 'Computer Systems Vulnerabilities', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 55-65, (2012).BARBU, I.D.: Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime 1 (2012) 55-65. https://www.ijisc.comBARBU, I.D., (2012), Computer Systems Vulnerabilities. International Journal of Information Security and Cybercrime, 1: 55-65. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1(1), 69-78. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1(1), 69-78. Available from: https://www.ijisc.comI.C. MIHAI, "Study on Cyber Attacks over Time and Cybercrime Evolution in Romania," International Journal of Information Security and Cybercrime, vol. 1, no. 1, pp. 69-78, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Study on Cyber Attacks over Time and Cybercrime Evolution in Romania', International Journal of Information Security and Cybercrime, vol. 1, no. 1, 69-78, (2012).MIHAI, I.C.: Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime 1 (2012) 69-78. https://www.ijisc.comMIHAI, I.C., (2012), Study on Cyber Attacks over Time and Cybercrime Evolution in Romania. International Journal of Information Security and Cybercrime, 1: 69-78. https://www.ijisc.com Citation Format :