IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • Volume 2, Issue 2, Year 2013

    IJISC
    Volume 2, Issue 2, Year 2013

    Published: December 2013
    Acceptance rate: 24%

    No. of scientific articles: 7
    No. of total articles: 9

    View IssuePlus

    ISSN: 2285-9225
    e-ISSN: 2286-0096
    DOI: 10.19107/IJISC.2013.02



    Table of Contents

    Encryption in Mobile Communications. ZUC Algorithm.

    Author(s): IANCU, Laura; BACIVAROV, Ioan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.01
    Pages: 7-18
    AbstractPlus | Quick view | Full article | Citations


    Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack

    Author(s): GROSU, Vlad-Alexandru
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.02
    Pages: 19-26
    AbstractPlus | Quick view | Full article | Citations


    Security Standards Analysis

    Author(s): MIHAI, Ioan-Cosmin
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.03
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Issues and Challenges in Cloud Computing Architectures

    Author(s): ISAC, Bogdan
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2013.02.04
    Pages: 35-42
    AbstractPlus | Quick view | Full article | Citations


    Buffer Overflow Vulnerability Exploitation Using Open-Source Tools

    Author(s): BARBU, Ionuț-Daniel
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.05
    Pages: 43-54
    AbstractPlus | Quick view | Full article | Citations


    Legislative Aspects of Cybersecurity

    Author(s): PEȚA, Cezar
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2013.02.06
    Pages: 55-60
    AbstractPlus | Quick view | Full article | Citations


    Wireless LAN Security Issues (I). Types of Attacks

    Author(s): GHERGHINA, Cătălina; PETRICĂ, Gabriel
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2013.02.07
    Pages: 61-68
    AbstractPlus | Quick view | Full article | Citations


    OWASP Romania InfoSec Conference 2013

    Author(s): BARBU, Ionuț-Daniel
    Section: Books Reviews and Conferences Analysis
    Pages: 69-70
    View article | Download PDF

    Mobile Security – A Major Issue of the 2014 Mobile World Congress

    Author(s): BACIVAROV, Ioan; BACIVAROV, Angelica
    Section: Books Reviews and Conferences Analysis
    Pages: 71-76
    View article | Download PDF