ŞCHEAU, M.C. (2017). Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6(1), 13-24. Retrieve from https://www.ijisc.comŞCHEAU, M.C., 2017. Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6(1), 13-24. Available from: https://www.ijisc.comM.C. ŞCHEAU, "Strategic Management of Critical Infrastructures and Financial Domain," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 13-24, 2017. Available: https://www.ijisc.comŞCHEAU, M.C., 'Strategic Management of Critical Infrastructures and Financial Domain', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 13-24, (2017).ŞCHEAU, M.C.: Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime 6 (2017) 13-24. https://www.ijisc.comŞCHEAU, M.C., (2017), Strategic Management of Critical Infrastructures and Financial Domain. International Journal of Information Security and Cybercrime, 6: 13-24. https://www.ijisc.com Citation Format :
DOBRINOIU, M. (2017). Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6(1), 25-32. Retrieve from https://www.ijisc.comDOBRINOIU, M., 2017. Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6(1), 25-32. Available from: https://www.ijisc.comM. DOBRINOIU, "Need for Education on Cybersecurity," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 25-32, 2017. Available: https://www.ijisc.comDOBRINOIU, M., 'Need for Education on Cybersecurity', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 25-32, (2017).DOBRINOIU, M.: Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime 6 (2017) 25-32. https://www.ijisc.comDOBRINOIU, M., (2017), Need for Education on Cybersecurity. International Journal of Information Security and Cybercrime, 6: 25-32. https://www.ijisc.com Citation Format :
PRICOPE, R. (2017). Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6(1), 33-40. Retrieve from https://www.ijisc.comPRICOPE, R., 2017. Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6(1), 33-40. Available from: https://www.ijisc.comR. PRICOPE, "Hardware and Software Technologies used in the Financial Industry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 33-40, 2017. Available: https://www.ijisc.comPRICOPE, R., 'Hardware and Software Technologies used in the Financial Industry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 33-40, (2017).PRICOPE, R.: Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime 6 (2017) 33-40. https://www.ijisc.comPRICOPE, R., (2017), Hardware and Software Technologies used in the Financial Industry. International Journal of Information Security and Cybercrime, 6: 33-40. https://www.ijisc.com Citation Format :
HOLM, E. (2017). The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime, 6(1), 41-50. Retrieve from https://www.ijisc.comHOLM, E., 2017. The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime 6(1), 41-50. Available from: https://www.ijisc.comE. HOLM, "The Darknet: A New Passageway to Identity Theft," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 41-50, 2017. Available: https://www.ijisc.comHOLM, E., 'The Darknet: A New Passageway to Identity Theft', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 41-50, (2017).HOLM, E.: The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime 6 (2017) 41-50. https://www.ijisc.comHOLM, E., (2017), The Darknet: A New Passageway to Identity Theft. International Journal of Information Security and Cybercrime, 6: 41-50. https://www.ijisc.com Citation Format :
NĂSTASE, L. (2017). Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6(1), 51-56. Retrieve from https://www.ijisc.comNĂSTASE, L., 2017. Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6(1), 51-56. Available from: https://www.ijisc.comL. NĂSTASE, "Public Key Infrastructures for Trust and Authentication in the IoT," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 51-56, 2017. Available: https://www.ijisc.comNĂSTASE, L., 'Public Key Infrastructures for Trust and Authentication in the IoT', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 51-56, (2017).NĂSTASE, L.: Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime 6 (2017) 51-56. https://www.ijisc.comNĂSTASE, L., (2017), Public Key Infrastructures for Trust and Authentication in the IoT. International Journal of Information Security and Cybercrime, 6: 51-56. https://www.ijisc.com Citation Format :
PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2017). Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6(1), 57-62. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2017. Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6(1), 57-62. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 57-62, 2017. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 57-62, (2017).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime 6 (2017) 57-62. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2017), Investigative Analysis and Technical Overview of Ransomware Based Attacks. Case Study: WannaCry. International Journal of Information Security and Cybercrime, 6: 57-62. https://www.ijisc.com Citation Format :
MURALI, S.P. (2017). Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime, 6(1), 63-66. Retrieve from https://www.ijisc.comMURALI, S.P., 2017. Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime 6(1), 63-66. Available from: https://www.ijisc.comS.P. MURALI, "Detecting Cyber Bullies on Twitter using Machine Learning Techniques," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 63-66, 2017. Available: https://www.ijisc.comMURALI, S.P., 'Detecting Cyber Bullies on Twitter using Machine Learning Techniques', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 63-66, (2017).MURALI, S.P.: Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime 6 (2017) 63-66. https://www.ijisc.comMURALI, S.P., (2017), Detecting Cyber Bullies on Twitter using Machine Learning Techniques. International Journal of Information Security and Cybercrime, 6: 63-66. https://www.ijisc.com Citation Format :
SUBAIRU, S.O.,ISAH, A.O.,ALHASSAN, J.K., (2017). Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6(1), 67-72. Retrieve from https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 2017. Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6(1), 67-72. Available from: https://www.ijisc.comS.O. SUBAIRU, A.O. ISAH, J.K. ALHASSAN, "Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit," International Journal of Information Security and Cybercrime, vol. 6, no. 1, pp. 67-72, 2017. Available: https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., 'Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit', International Journal of Information Security and Cybercrime, vol. 6, no. 1, 67-72, (2017).SUBAIRU, S.O.,ISAH, A.O.,ALHASSAN, J.K.,: Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime 6 (2017) 67-72. https://www.ijisc.comSUBAIRU, S.O., ISAH, A.O., ALHASSAN, J.K., (2017), Comparative Performance Study of Antimalware Tools on TDL-4 Rootkit. International Journal of Information Security and Cybercrime, 6: 67-72. https://www.ijisc.com Citation Format :