PASĂRE, A.L.,CIUCHI, C.,BOTAN, C., (2014). A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3(2), 7-18. Retrieve from https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 2014. A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3(2), 7-18. Available from: https://www.ijisc.comA.L. PASĂRE, C. CIUCHI, C. BOTAN, "A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 7-18, 2014. Available: https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., 'A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 7-18, (2014).PASĂRE, A.L.,CIUCHI, C.,BOTAN, C.,: A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime 3 (2014) 7-18. https://www.ijisc.comPASĂRE, A.L., CIUCHI, C., BOTAN, C., (2014), A New Approach for e-Government Process: Standardization of Identity, Security and Internet Content in Public Administration. Registry of Subdomains GOV.RO. International Journal of Information Security and Cybercrime, 3: 7-18. https://www.ijisc.com Citation Format :
SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P., (2014). An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3(2), 19-28. Retrieve from https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 2014. An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3(2), 19-28. Available from: https://www.ijisc.comP.K. SINGH, O.P. SANGWAN, A. PRATAP, A.P. SINGH, "An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 19-28, 2014. Available: https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 'An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 19-28, (2014).SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P.,: An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3 (2014) 19-28. https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., (2014), An Analysis on Software Reusability in Context of Object Oriented and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3: 19-28. https://www.ijisc.com Citation Format :
ȘTEFĂNESCU, Y.A. (2014). Security Standards. International Journal of Information Security and Cybercrime, 3(2), 29-36. Retrieve from https://www.ijisc.comȘTEFĂNESCU, Y.A., 2014. Security Standards. International Journal of Information Security and Cybercrime 3(2), 29-36. Available from: https://www.ijisc.comY.A. ȘTEFĂNESCU, "Security Standards," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 29-36, 2014. Available: https://www.ijisc.comȘTEFĂNESCU, Y.A., 'Security Standards', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 29-36, (2014).ȘTEFĂNESCU, Y.A.: Security Standards. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comȘTEFĂNESCU, Y.A., (2014), Security Standards. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D., (2014). Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3(2), 37-42. Retrieve from https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 2014. Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3(2), 37-42. Available from: https://www.ijisc.comI.C. MIHAI, Ș. PRUNĂ, I.D. BARBU, "Cyber Kill Chain Analysis," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 37-42, 2014. Available: https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., 'Cyber Kill Chain Analysis', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 37-42, (2014).MIHAI, I.C.,PRUNĂ, Ș.,BARBU, I.D.,: Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime 3 (2014) 37-42. https://www.ijisc.comMIHAI, I.C., PRUNĂ, Ș., BARBU, I.D., (2014), Cyber Kill Chain Analysis. International Journal of Information Security and Cybercrime, 3: 37-42. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2014). Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3(2), 43-48. Retrieve from https://www.ijisc.comOANCEA, C.V., 2014. Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3(2), 43-48. Available from: https://www.ijisc.comC.V. OANCEA, "Cybersecurity in Cloud Computing Context," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 43-48, 2014. Available: https://www.ijisc.comOANCEA, C.V., 'Cybersecurity in Cloud Computing Context', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 43-48, (2014).OANCEA, C.V.: Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime 3 (2014) 43-48. https://www.ijisc.comOANCEA, C.V., (2014), Cybersecurity in Cloud Computing Context. International Journal of Information Security and Cybercrime, 3: 43-48. https://www.ijisc.com Citation Format :
BARBU, I.D.,BACIVAROV, I., (2014). Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3(2), 49-60. Retrieve from https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 2014. Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3(2), 49-60. Available from: https://www.ijisc.comI.D. BARBU, I. BACIVAROV, "Heartbleed – The Vulnerability That Changed the Internet," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 49-60, 2014. Available: https://www.ijisc.comBARBU, I.D., BACIVAROV, I., 'Heartbleed – The Vulnerability That Changed the Internet', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 49-60, (2014).BARBU, I.D.,BACIVAROV, I.,: Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime 3 (2014) 49-60. https://www.ijisc.comBARBU, I.D., BACIVAROV, I., (2014), Heartbleed – The Vulnerability That Changed the Internet. International Journal of Information Security and Cybercrime, 3: 49-60. https://www.ijisc.com Citation Format :
AXINTE, S.D. (2014). SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3(2), 61-68. Retrieve from https://www.ijisc.comAXINTE, S.D., 2014. SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3(2), 61-68. Available from: https://www.ijisc.comS.D. AXINTE, "SQL Injection Testing in Web Applications Using SQLmap," International Journal of Information Security and Cybercrime, vol. 3, no. 2, pp. 61-68, 2014. Available: https://www.ijisc.comAXINTE, S.D., 'SQL Injection Testing in Web Applications Using SQLmap', International Journal of Information Security and Cybercrime, vol. 3, no. 2, 61-68, (2014).AXINTE, S.D.: SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime 3 (2014) 61-68. https://www.ijisc.comAXINTE, S.D., (2014), SQL Injection Testing in Web Applications Using SQLmap. International Journal of Information Security and Cybercrime, 3: 61-68. https://www.ijisc.com Citation Format :