BĂNUȚĂ, B.A. (2012). Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1(2), 9-16. Retrieve from https://www.ijisc.comBĂNUȚĂ, B.A., 2012. Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1(2), 9-16. Available from: https://www.ijisc.comB.A. BĂNUȚĂ, "Security Technologies Implemented in MPLS VPN Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012. Available: https://www.ijisc.comBĂNUȚĂ, B.A., 'Security Technologies Implemented in MPLS VPN Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 9-16, (2012).BĂNUȚĂ, B.A.: Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime 1 (2012) 9-16. https://www.ijisc.comBĂNUȚĂ, B.A., (2012), Security Technologies Implemented in MPLS VPN Networks. International Journal of Information Security and Cybercrime, 1: 9-16. https://www.ijisc.com Citation Format :
GEANĂ, I.C. (2012). Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1(2), 17-24. Retrieve from https://www.ijisc.comGEANĂ, I.C., 2012. Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1(2), 17-24. Available from: https://www.ijisc.comI.C. GEANĂ, "Security Solutions for Informatics Systems," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 17-24, 2012. Available: https://www.ijisc.comGEANĂ, I.C., 'Security Solutions for Informatics Systems', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 17-24, (2012).GEANĂ, I.C.: Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime 1 (2012) 17-24. https://www.ijisc.comGEANĂ, I.C., (2012), Security Solutions for Informatics Systems. International Journal of Information Security and Cybercrime, 1: 17-24. https://www.ijisc.com Citation Format :
COMȘA, A.C. (2012). Security Standards Analysis. International Journal of Information Security and Cybercrime, 1(2), 25-30. Retrieve from https://www.ijisc.comCOMȘA, A.C., 2012. Security Standards Analysis. International Journal of Information Security and Cybercrime 1(2), 25-30. Available from: https://www.ijisc.comA.C. COMȘA, "Security Standards Analysis," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 25-30, 2012. Available: https://www.ijisc.comCOMȘA, A.C., 'Security Standards Analysis', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 25-30, (2012).COMȘA, A.C.: Security Standards Analysis. International Journal of Information Security and Cybercrime 1 (2012) 25-30. https://www.ijisc.comCOMȘA, A.C., (2012), Security Standards Analysis. International Journal of Information Security and Cybercrime, 1: 25-30. https://www.ijisc.com Citation Format :
GHERGHINA, C. (2012). Cyberterrorism. International Journal of Information Security and Cybercrime, 1(2), 33-39. Retrieve from https://www.ijisc.comGHERGHINA, C., 2012. Cyberterrorism. International Journal of Information Security and Cybercrime 1(2), 33-39. Available from: https://www.ijisc.comC. GHERGHINA, "Cyberterrorism," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 33-39, 2012. Available: https://www.ijisc.comGHERGHINA, C., 'Cyberterrorism', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 33-39, (2012).GHERGHINA, C.: Cyberterrorism. International Journal of Information Security and Cybercrime 1 (2012) 33-39. https://www.ijisc.comGHERGHINA, C., (2012), Cyberterrorism. International Journal of Information Security and Cybercrime, 1: 33-39. https://www.ijisc.com Citation Format :
COSTEA, I. (2012). Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1(2), 40-47. Retrieve from https://www.ijisc.comCOSTEA, I., 2012. Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1(2), 40-47. Available from: https://www.ijisc.comI. COSTEA, "Data Privacy Assurance in Virtual Private Networks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 40-47, 2012. Available: https://www.ijisc.comCOSTEA, I., 'Data Privacy Assurance in Virtual Private Networks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 40-47, (2012).COSTEA, I.: Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime 1 (2012) 40-47. https://www.ijisc.comCOSTEA, I., (2012), Data Privacy Assurance in Virtual Private Networks. International Journal of Information Security and Cybercrime, 1: 40-47. https://www.ijisc.com Citation Format :
IANCU, L. (2012). An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1(2), 48-57. Retrieve from https://www.ijisc.comIANCU, L., 2012. An Overview of LTE Security. International Journal of Information Security and Cybercrime 1(2), 48-57. Available from: https://www.ijisc.comL. IANCU, "An Overview of LTE Security," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 48-57, 2012. Available: https://www.ijisc.comIANCU, L., 'An Overview of LTE Security', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 48-57, (2012).IANCU, L.: An Overview of LTE Security. International Journal of Information Security and Cybercrime 1 (2012) 48-57. https://www.ijisc.comIANCU, L., (2012), An Overview of LTE Security. International Journal of Information Security and Cybercrime, 1: 48-57. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2012). Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1(2), 61-67. Retrieve from https://www.ijisc.comMIHAI, I.C., 2012. Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1(2), 61-67. Available from: https://www.ijisc.comI.C. MIHAI, "Overview on Phishing Attacks," International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 61-67, 2012. Available: https://www.ijisc.comMIHAI, I.C., 'Overview on Phishing Attacks', International Journal of Information Security and Cybercrime, vol. 1, no. 2, 61-67, (2012).MIHAI, I.C.: Overview on Phishing Attacks. International Journal of Information Security and Cybercrime 1 (2012) 61-67. https://www.ijisc.comMIHAI, I.C., (2012), Overview on Phishing Attacks. International Journal of Information Security and Cybercrime, 1: 61-67. https://www.ijisc.com Citation Format :