AXINTE, S.D. (2016). Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5(2), 9-16. Retrieve from https://www.ijisc.comAXINTE, S.D., 2016. Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5(2), 9-16. Available from: https://www.ijisc.comS.D. AXINTE, "Security Challenges for Software Development Companies," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 9-16, 2016. Available: https://www.ijisc.comAXINTE, S.D., 'Security Challenges for Software Development Companies', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 9-16, (2016).AXINTE, S.D.: Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime 5 (2016) 9-16. https://www.ijisc.comAXINTE, S.D., (2016), Security Challenges for Software Development Companies. International Journal of Information Security and Cybercrime, 5: 9-16. https://www.ijisc.com Citation Format :
ALEXANDRU, A.C. (2016). Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5(2), 17-24. Retrieve from https://www.ijisc.comALEXANDRU, A.C., 2016. Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5(2), 17-24. Available from: https://www.ijisc.comA.C. ALEXANDRU, "Information Security Aspects of Business Continuity Management," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 17-24, 2016. Available: https://www.ijisc.comALEXANDRU, A.C., 'Information Security Aspects of Business Continuity Management', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 17-24, (2016).ALEXANDRU, A.C.: Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime 5 (2016) 17-24. https://www.ijisc.comALEXANDRU, A.C., (2016), Information Security Aspects of Business Continuity Management. International Journal of Information Security and Cybercrime, 5: 17-24. https://www.ijisc.com Citation Format :
MIHAI, I.C. (2016). Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime, 5(2), 25-30. Retrieve from https://www.ijisc.comMIHAI, I.C., 2016. Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime 5(2), 25-30. Available from: https://www.ijisc.comI.C. MIHAI, "Romanian Legislation on Cybercrime," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 25-30, 2016. Available: https://www.ijisc.comMIHAI, I.C., 'Romanian Legislation on Cybercrime', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 25-30, (2016).MIHAI, I.C.: Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime 5 (2016) 25-30. https://www.ijisc.comMIHAI, I.C., (2016), Romanian Legislation on Cybercrime. International Journal of Information Security and Cybercrime, 5: 25-30. https://www.ijisc.com Citation Format :
EFG, A. (2016). The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5(2), 31-50. Retrieve from https://www.ijisc.comEFG, A., 2016. The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5(2), 31-50. Available from: https://www.ijisc.comA. EFG, "The Impact of Cybercrimes on Global Trade and Commerce," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 31-50, 2016. Available: https://www.ijisc.comEFG, A., 'The Impact of Cybercrimes on Global Trade and Commerce', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 31-50, (2016).EFG, A.: The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime 5 (2016) 31-50. https://www.ijisc.comEFG, A., (2016), The Impact of Cybercrimes on Global Trade and Commerce. International Journal of Information Security and Cybercrime, 5: 31-50. https://www.ijisc.com Citation Format :
MARCOCI, P.M. (2016). Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime, 5(2), 51-56. Retrieve from https://www.ijisc.comMARCOCI, P.M., 2016. Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime 5(2), 51-56. Available from: https://www.ijisc.comP.M. MARCOCI, "Cyber Espionage Incrimination in Romanian Legislation," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 51-56, 2016. Available: https://www.ijisc.comMARCOCI, P.M., 'Cyber Espionage Incrimination in Romanian Legislation', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 51-56, (2016).MARCOCI, P.M.: Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime 5 (2016) 51-56. https://www.ijisc.comMARCOCI, P.M., (2016), Cyber Espionage Incrimination in Romanian Legislation. International Journal of Information Security and Cybercrime, 5: 51-56. https://www.ijisc.com Citation Format :
PATIL, D.R.,PATIL, J.B., (2016). Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5(2), 57-70. Retrieve from https://www.ijisc.comPATIL, D.R., PATIL, J.B., 2016. Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5(2), 57-70. Available from: https://www.ijisc.comD.R. PATIL, J.B. PATIL, "Malicious Web Pages Detection Using Static Analysis of URLs," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 57-70, 2016. Available: https://www.ijisc.comPATIL, D.R., PATIL, J.B., 'Malicious Web Pages Detection Using Static Analysis of URLs', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 57-70, (2016).PATIL, D.R.,PATIL, J.B.,: Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime 5 (2016) 57-70. https://www.ijisc.comPATIL, D.R., PATIL, J.B., (2016), Malicious Web Pages Detection Using Static Analysis of URLs. International Journal of Information Security and Cybercrime, 5: 57-70. https://www.ijisc.com Citation Format :
IWASOKUN, G.B. (2016). A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime, 5(2), 71-86. Retrieve from https://www.ijisc.comIWASOKUN, G.B., 2016. A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime 5(2), 71-86. Available from: https://www.ijisc.comG.B. IWASOKUN, "A Fingerprint-Based Scheme for ATM User Authentication," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 71-86, 2016. Available: https://www.ijisc.comIWASOKUN, G.B., 'A Fingerprint-Based Scheme for ATM User Authentication', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 71-86, (2016).IWASOKUN, G.B.: A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime 5 (2016) 71-86. https://www.ijisc.comIWASOKUN, G.B., (2016), A Fingerprint-Based Scheme for ATM User Authentication. International Journal of Information Security and Cybercrime, 5: 71-86. https://www.ijisc.com Citation Format :
PETRICĂ, G. (2016). Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime, 5(2), 87-94. Retrieve from https://www.ijisc.comPETRICĂ, G., 2016. Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime 5(2), 87-94. Available from: https://www.ijisc.comG. PETRICĂ, "Servers Configuration and Testing for Secure Exchange of Information over the Internet," International Journal of Information Security and Cybercrime, vol. 5, no. 2, pp. 87-94, 2016. Available: https://www.ijisc.comPETRICĂ, G., 'Servers Configuration and Testing for Secure Exchange of Information over the Internet', International Journal of Information Security and Cybercrime, vol. 5, no. 2, 87-94, (2016).PETRICĂ, G.: Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime 5 (2016) 87-94. https://www.ijisc.comPETRICĂ, G., (2016), Servers Configuration and Testing for Secure Exchange of Information over the Internet. International Journal of Information Security and Cybercrime, 5: 87-94. https://www.ijisc.com Citation Format :