MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș., (2015). Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4(1), 9-14. Retrieve from https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 2015. Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4(1), 9-14. Available from: https://www.ijisc.comI.C. MIHAI, R. GENOE, Ș. PRUNĂ, "Strategies for Monitoring Website Security against Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 9-14, 2015. Available: https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., 'Strategies for Monitoring Website Security against Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 9-14, (2015).MIHAI, I.C.,GENOE, R.,PRUNĂ, Ș.,: Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime 4 (2015) 9-14. https://www.ijisc.comMIHAI, I.C., GENOE, R., PRUNĂ, Ș., (2015), Strategies for Monitoring Website Security against Cyber-Attacks. International Journal of Information Security and Cybercrime, 4: 9-14. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2015). New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4(1), 15-21. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2015. New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4(1), 15-21. Available from: https://www.ijisc.comM. DOBRINOIU, "New Challenges for Cybersecurity and Possible Criminal Law," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 15-21, 2015. Available: https://www.ijisc.comDOBRINOIU, M., 'New Challenges for Cybersecurity and Possible Criminal Law', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 15-21, (2015).DOBRINOIU, M.: New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime 4 (2015) 15-21. https://www.ijisc.comDOBRINOIU, M., (2015), New Challenges for Cybersecurity and Possible Criminal Law. International Journal of Information Security and Cybercrime, 4: 15-21. https://www.ijisc.com Citation Format :
DOGARU, O. (2015). The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime, 4(1), 22-26. Retrieve from https://www.ijisc.comDOGARU, O., 2015. The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime 4(1), 22-26. Available from: https://www.ijisc.comO. DOGARU, "The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 22-26, 2015. Available: https://www.ijisc.comDOGARU, O., 'The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 22-26, (2015).DOGARU, O.: The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime 4 (2015) 22-26. https://www.ijisc.comDOGARU, O., (2015), The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation. International Journal of Information Security and Cybercrime, 4: 22-26. https://www.ijisc.com Citation Format :
SAIED, J.,MEHDI, S., (2015). A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime, 4(1), 27-32. Retrieve from https://www.ijisc.comSAIED, J., MEHDI, S., 2015. A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime 4(1), 27-32. Available from: https://www.ijisc.comJ. SAIED, S. MEHDI, "A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 27-32, 2015. Available: https://www.ijisc.comSAIED, J., MEHDI, S., 'A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 27-32, (2015).SAIED, J.,MEHDI, S.,: A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comSAIED, J., MEHDI, S., (2015), A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
MARTIN, I. (2015). Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4(1), 33-40. Retrieve from https://www.ijisc.comMARTIN, I., 2015. Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4(1), 33-40. Available from: https://www.ijisc.comI. MARTIN, "Cyber Security Strategies – an Overview," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 33-40, 2015. Available: https://www.ijisc.comMARTIN, I., 'Cyber Security Strategies – an Overview', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 33-40, (2015).MARTIN, I.: Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime 4 (2015) 33-40. https://www.ijisc.comMARTIN, I., (2015), Cyber Security Strategies – an Overview. International Journal of Information Security and Cybercrime, 4: 33-40. https://www.ijisc.com Citation Format :
BARBU, I.D.,PETRICĂ, G., (2015). Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4(1), 41-46. Retrieve from https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 2015. Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4(1), 41-46. Available from: https://www.ijisc.comI.D. BARBU, G. PETRICĂ, "Defense in Depth Principle to Ensure Information Security," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 41-46, 2015. Available: https://www.ijisc.comBARBU, I.D., PETRICĂ, G., 'Defense in Depth Principle to Ensure Information Security', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 41-46, (2015).BARBU, I.D.,PETRICĂ, G.,: Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime 4 (2015) 41-46. https://www.ijisc.comBARBU, I.D., PETRICĂ, G., (2015), Defense in Depth Principle to Ensure Information Security. International Journal of Information Security and Cybercrime, 4: 41-46. https://www.ijisc.com Citation Format :
PIYUSH, C. (2015). A Survey of the Prominent Effects of Cybersquatting in India. International Journal of Information Security and Cybercrime, 4(1), 47-58. Retrieve from https://www.ijisc.comPIYUSH, C., 2015. A Survey of the Prominent Effects of Cybersquatting in India. International Journal of Information Security and Cybercrime 4(1), 47-58. Available from: https://www.ijisc.comC. PIYUSH, "A Survey of the Prominent Effects of Cybersquatting in India," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 47-58, 2015. Available: https://www.ijisc.comPIYUSH, C., 'A Survey of the Prominent Effects of Cybersquatting in India', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 47-58, (2015).PIYUSH, C.: A Survey of the Prominent Effects of Cybersquatting in India. International Journal of Information Security and Cybercrime 4 (2015) 47-58. https://www.ijisc.comPIYUSH, C., (2015), A Survey of the Prominent Effects of Cybersquatting in India. International Journal of Information Security and Cybercrime, 4: 47-58. https://www.ijisc.com Citation Format :
OANCEA, C.V. (2015). Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4(1), 59-62. Retrieve from https://www.ijisc.comOANCEA, C.V., 2015. Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4(1), 59-62. Available from: https://www.ijisc.comC.V. OANCEA, "Artificial Intelligence Role in Cybersecurity Infrastructures," International Journal of Information Security and Cybercrime, vol. 4, no. 1, pp. 59-62, 2015. Available: https://www.ijisc.comOANCEA, C.V., 'Artificial Intelligence Role in Cybersecurity Infrastructures', International Journal of Information Security and Cybercrime, vol. 4, no. 1, 59-62, (2015).OANCEA, C.V.: Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime 4 (2015) 59-62. https://www.ijisc.comOANCEA, C.V., (2015), Artificial Intelligence Role in Cybersecurity Infrastructures. International Journal of Information Security and Cybercrime, 4: 59-62. https://www.ijisc.com Citation Format :