IANCU, L.,BACIVAROV, I., (2013). Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2(2), 7-18. Retrieve from https://www.ijisc.comIANCU, L., BACIVAROV, I., 2013. Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2(2), 7-18. Available from: https://www.ijisc.comL. IANCU, I. BACIVAROV, "Encryption in Mobile Communications. ZUC Algorithm.," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 7-18, 2013. Available: https://www.ijisc.comIANCU, L., BACIVAROV, I., 'Encryption in Mobile Communications. ZUC Algorithm.', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 7-18, (2013).IANCU, L.,BACIVAROV, I.,: Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime 2 (2013) 7-18. https://www.ijisc.comIANCU, L., BACIVAROV, I., (2013), Encryption in Mobile Communications. ZUC Algorithm.. International Journal of Information Security and Cybercrime, 2: 7-18. https://www.ijisc.com Citation Format :
GROSU, V.A. (2013). Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2(2), 19-26. Retrieve from https://www.ijisc.comGROSU, V.A., 2013. Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2(2), 19-26. Available from: https://www.ijisc.comV.A. GROSU, "Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 19-26, 2013. Available: https://www.ijisc.comGROSU, V.A., 'Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 19-26, (2013).GROSU, V.A.: Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime 2 (2013) 19-26. https://www.ijisc.comGROSU, V.A., (2013), Hill’s Cipher: Analysis of the Cryptographic Computational Times in the Eventuality of a Brute-Force Attack. International Journal of Information Security and Cybercrime, 2: 19-26. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2013). Security Standards Analysis. International Journal of Information Security and Cybercrime, 2(2), 27-34. Retrieve from https://www.ijisc.comMIHAI, I.C., 2013. Security Standards Analysis. International Journal of Information Security and Cybercrime 2(2), 27-34. Available from: https://www.ijisc.comI.C. MIHAI, "Security Standards Analysis," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 27-34, 2013. Available: https://www.ijisc.comMIHAI, I.C., 'Security Standards Analysis', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 27-34, (2013).MIHAI, I.C.: Security Standards Analysis. International Journal of Information Security and Cybercrime 2 (2013) 27-34. https://www.ijisc.comMIHAI, I.C., (2013), Security Standards Analysis. International Journal of Information Security and Cybercrime, 2: 27-34. https://www.ijisc.com Citation Format :
ISAC, B. (2013). Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2(2), 35-42. Retrieve from https://www.ijisc.comISAC, B., 2013. Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2(2), 35-42. Available from: https://www.ijisc.comB. ISAC, "Issues and Challenges in Cloud Computing Architectures," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 35-42, 2013. Available: https://www.ijisc.comISAC, B., 'Issues and Challenges in Cloud Computing Architectures', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 35-42, (2013).ISAC, B.: Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime 2 (2013) 35-42. https://www.ijisc.comISAC, B., (2013), Issues and Challenges in Cloud Computing Architectures. International Journal of Information Security and Cybercrime, 2: 35-42. https://www.ijisc.com Citation Format :
BARBU, I.D. (2013). Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2(2), 43-54. Retrieve from https://www.ijisc.comBARBU, I.D., 2013. Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2(2), 43-54. Available from: https://www.ijisc.comI.D. BARBU, "Buffer Overflow Vulnerability Exploitation Using Open-Source Tools," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 43-54, 2013. Available: https://www.ijisc.comBARBU, I.D., 'Buffer Overflow Vulnerability Exploitation Using Open-Source Tools', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 43-54, (2013).BARBU, I.D.: Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime 2 (2013) 43-54. https://www.ijisc.comBARBU, I.D., (2013), Buffer Overflow Vulnerability Exploitation Using Open-Source Tools. International Journal of Information Security and Cybercrime, 2: 43-54. https://www.ijisc.com Citation Format :
PEȚA, C. (2013). Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2(2), 55-60. Retrieve from https://www.ijisc.comPEȚA, C., 2013. Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2(2), 55-60. Available from: https://www.ijisc.comC. PEȚA, "Legislative Aspects of Cybersecurity," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 55-60, 2013. Available: https://www.ijisc.comPEȚA, C., 'Legislative Aspects of Cybersecurity', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 55-60, (2013).PEȚA, C.: Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime 2 (2013) 55-60. https://www.ijisc.comPEȚA, C., (2013), Legislative Aspects of Cybersecurity. International Journal of Information Security and Cybercrime, 2: 55-60. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2013). Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2(2), 61-68. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2013. Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2(2), 61-68. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (I). Types of Attacks," International Journal of Information Security and Cybercrime, vol. 2, no. 2, pp. 61-68, 2013. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (I). Types of Attacks', International Journal of Information Security and Cybercrime, vol. 2, no. 2, 61-68, (2013).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime 2 (2013) 61-68. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2013), Wireless LAN Security Issues (I). Types of Attacks. International Journal of Information Security and Cybercrime, 2: 61-68. https://www.ijisc.com Citation Format :