ÇAKIR, H.,KILIÇ, M.S., (2015). Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime, 4(2), 9-20. Retrieve from https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., 2015. Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime 4(2), 9-20. Available from: https://www.ijisc.comH. ÇAKIR, M.S. KILIÇ, "Importance of Operating Systems Type in Computer Forensics," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 9-20, 2015. Available: https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., 'Importance of Operating Systems Type in Computer Forensics', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 9-20, (2015).ÇAKIR, H.,KILIÇ, M.S.,: Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime 4 (2015) 9-20. https://www.ijisc.comÇAKIR, H., KILIÇ, M.S., (2015), Importance of Operating Systems Type in Computer Forensics. International Journal of Information Security and Cybercrime, 4: 9-20. https://www.ijisc.com Citation Format :
LAKADE, S. (2015). Digital Forensics: Current Scenario and Future Challenges. International Journal of Information Security and Cybercrime, 4(2), 21-26. Retrieve from https://www.ijisc.comLAKADE, S., 2015. Digital Forensics: Current Scenario and Future Challenges. International Journal of Information Security and Cybercrime 4(2), 21-26. Available from: https://www.ijisc.comS. LAKADE, "Digital Forensics: Current Scenario and Future Challenges," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 21-26, 2015. Available: https://www.ijisc.comLAKADE, S., 'Digital Forensics: Current Scenario and Future Challenges', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 21-26, (2015).LAKADE, S.: Digital Forensics: Current Scenario and Future Challenges. International Journal of Information Security and Cybercrime 4 (2015) 21-26. https://www.ijisc.comLAKADE, S., (2015), Digital Forensics: Current Scenario and Future Challenges. International Journal of Information Security and Cybercrime, 4: 21-26. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D., (2015). Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4(2), 27-32. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., 2015. Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4(2), 27-32. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, "Ransomware – an Emerging Threat," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 27-32, 2015. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., 'Ransomware – an Emerging Threat', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 27-32, (2015).PASCARIU, C.,BARBU, I.D.,: Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime 4 (2015) 27-32. https://www.ijisc.comPASCARIU, C., BARBU, I.D., (2015), Ransomware – an Emerging Threat. International Journal of Information Security and Cybercrime, 4: 27-32. https://www.ijisc.com Citation Format :
EFG, A. (2015). The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4(2), 33-48. Retrieve from https://www.ijisc.comEFG, A., 2015. The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime 4(2), 33-48. Available from: https://www.ijisc.comA. EFG, "The Challenges to Enforcement of Cybercrimes Laws and Policy," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 33-48, 2015. Available: https://www.ijisc.comEFG, A., 'The Challenges to Enforcement of Cybercrimes Laws and Policy', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 33-48, (2015).EFG, A.: The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime 4 (2015) 33-48. https://www.ijisc.comEFG, A., (2015), The Challenges to Enforcement of Cybercrimes Laws and Policy. International Journal of Information Security and Cybercrime, 4: 33-48. https://www.ijisc.com Citation Format :
HOLM, E. (2015). Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime, 4(2), 49-60. Retrieve from https://www.ijisc.comHOLM, E., 2015. Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime 4(2), 49-60. Available from: https://www.ijisc.comE. HOLM, "Identity Crime: Deliberating on Remedies for the Victim," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 49-60, 2015. Available: https://www.ijisc.comHOLM, E., 'Identity Crime: Deliberating on Remedies for the Victim', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 49-60, (2015).HOLM, E.: Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime 4 (2015) 49-60. https://www.ijisc.comHOLM, E., (2015), Identity Crime: Deliberating on Remedies for the Victim. International Journal of Information Security and Cybercrime, 4: 49-60. https://www.ijisc.com Citation Format :
NWOYE, C.J. (2015). Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4(2), 61-72. Retrieve from https://www.ijisc.comNWOYE, C.J., 2015. Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4(2), 61-72. Available from: https://www.ijisc.comC.J. NWOYE, "Cybercrime Prevention in Online Transaction Using Biometric Access Control," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 61-72, 2015. Available: https://www.ijisc.comNWOYE, C.J., 'Cybercrime Prevention in Online Transaction Using Biometric Access Control', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 61-72, (2015).NWOYE, C.J.: Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime 4 (2015) 61-72. https://www.ijisc.comNWOYE, C.J., (2015), Cybercrime Prevention in Online Transaction Using Biometric Access Control. International Journal of Information Security and Cybercrime, 4: 61-72. https://www.ijisc.com Citation Format :
ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G., (2015). Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4(2), 73-85. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 2015. Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4(2), 73-85. Available from: https://www.ijisc.comM.C. ŞCHEAU, L. ARSENE, G. DINCĂ, "Infection Vectors – Risk Factors for Financial Transactions," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 73-85, 2015. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., 'Infection Vectors – Risk Factors for Financial Transactions', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 73-85, (2015).ŞCHEAU, M.C.,ARSENE, L.,DINCĂ, G.,: Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime 4 (2015) 73-85. https://www.ijisc.comŞCHEAU, M.C., ARSENE, L., DINCĂ, G., (2015), Infection Vectors – Risk Factors for Financial Transactions. International Journal of Information Security and Cybercrime, 4: 73-85. https://www.ijisc.com Citation Format :
RAZA, M.S. (2015). Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime, 4(2), 86-90. Retrieve from https://www.ijisc.comRAZA, M.S., 2015. Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime 4(2), 86-90. Available from: https://www.ijisc.comM.S. RAZA, "Cyber Laundering: Understanding the Trends and Typologies," International Journal of Information Security and Cybercrime, vol. 4, no. 2, pp. 86-90, 2015. Available: https://www.ijisc.comRAZA, M.S., 'Cyber Laundering: Understanding the Trends and Typologies', International Journal of Information Security and Cybercrime, vol. 4, no. 2, 86-90, (2015).RAZA, M.S.: Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime 4 (2015) 86-90. https://www.ijisc.comRAZA, M.S., (2015), Cyber Laundering: Understanding the Trends and Typologies. International Journal of Information Security and Cybercrime, 4: 86-90. https://www.ijisc.com Citation Format :