HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A., (2017). Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6(2), 9-16. Retrieve from https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 2017. Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6(2), 9-16. Available from: https://www.ijisc.comM.S. HASHIM, N.A. RAHMAN, A.N. ZIN, K.A. MAHAMAD, F.A. AHMAD, "Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 9-16, 2017. Available: https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., 'Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 9-16, (2017).HASHIM, M.S.,RAHMAN, N.A.,ZIN, A.N.,MAHAMAD, K.A.,AHMAD, F.A.,: Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime 6 (2017) 9-16. https://www.ijisc.comHASHIM, M.S., RAHMAN, N.A., ZIN, A.N., MAHAMAD, K.A., AHMAD, F.A., (2017), Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data. International Journal of Information Security and Cybercrime, 6: 9-16. https://www.ijisc.com Citation Format :
BĂDIŢĂ, A.G. (2017). The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6(2), 17-22. Retrieve from https://www.ijisc.comBĂDIŢĂ, A.G., 2017. The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6(2), 17-22. Available from: https://www.ijisc.comA.G. BĂDIŢĂ, "The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 17-22, 2017. Available: https://www.ijisc.comBĂDIŢĂ, A.G., 'The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 17-22, (2017).BĂDIŢĂ, A.G.: The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime 6 (2017) 17-22. https://www.ijisc.comBĂDIŢĂ, A.G., (2017), The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport. International Journal of Information Security and Cybercrime, 6: 17-22. https://www.ijisc.com Citation Format :
AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I., (2017). Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6(2), 23-26. Retrieve from https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 2017. Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6(2), 23-26. Available from: https://www.ijisc.comS.D. AXINTE, G. PETRICĂ, I. BACIVAROV, "Browsers Cookies – An (In)security Analysis," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 23-26, 2017. Available: https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., 'Browsers Cookies – An (In)security Analysis', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 23-26, (2017).AXINTE, S.D.,PETRICĂ, G.,BACIVAROV, I.,: Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime 6 (2017) 23-26. https://www.ijisc.comAXINTE, S.D., PETRICĂ, G., BACIVAROV, I., (2017), Browsers Cookies – An (In)security Analysis. International Journal of Information Security and Cybercrime, 6: 23-26. https://www.ijisc.com Citation Format :
ANGHEL, M.C. (2017). Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime, 6(2), 27-34. Retrieve from https://www.ijisc.comANGHEL, M.C., 2017. Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime 6(2), 27-34. Available from: https://www.ijisc.comM.C. ANGHEL, "Transaction Security in Online Banking and e-Commerce," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 27-34, 2017. Available: https://www.ijisc.comANGHEL, M.C., 'Transaction Security in Online Banking and e-Commerce', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 27-34, (2017).ANGHEL, M.C.: Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime 6 (2017) 27-34. https://www.ijisc.comANGHEL, M.C., (2017), Transaction Security in Online Banking and e-Commerce. International Journal of Information Security and Cybercrime, 6: 27-34. https://www.ijisc.com Citation Format :
BEŞLIU, D.C. (2017). Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6(2), 35-39. Retrieve from https://www.ijisc.comBEŞLIU, D.C., 2017. Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6(2), 35-39. Available from: https://www.ijisc.comD.C. BEŞLIU, "Cyber Terrorism – A Growing Threat in the Field of Cyber Security," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 35-39, 2017. Available: https://www.ijisc.comBEŞLIU, D.C., 'Cyber Terrorism – A Growing Threat in the Field of Cyber Security', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 35-39, (2017).BEŞLIU, D.C.: Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime 6 (2017) 35-39. https://www.ijisc.comBEŞLIU, D.C., (2017), Cyber Terrorism – A Growing Threat in the Field of Cyber Security. International Journal of Information Security and Cybercrime, 6: 35-39. https://www.ijisc.com Citation Format :
PAULIȘ, M.A. (2017). Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6(2), 40-46. Retrieve from https://www.ijisc.comPAULIȘ, M.A., 2017. Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6(2), 40-46. Available from: https://www.ijisc.comM.A. PAULIȘ, "Solutions for Network Traffic Security: VPN Through IPsec and PKI," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 40-46, 2017. Available: https://www.ijisc.comPAULIȘ, M.A., 'Solutions for Network Traffic Security: VPN Through IPsec and PKI', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 40-46, (2017).PAULIȘ, M.A.: Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime 6 (2017) 40-46. https://www.ijisc.comPAULIȘ, M.A., (2017), Solutions for Network Traffic Security: VPN Through IPsec and PKI. International Journal of Information Security and Cybercrime, 6: 40-46. https://www.ijisc.com Citation Format :
COMAN, I.M. (2017). Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6(2), 47-52. Retrieve from https://www.ijisc.comCOMAN, I.M., 2017. Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6(2), 47-52. Available from: https://www.ijisc.comI.M. COMAN, "Cross-Border Cyber-Attacks and Critical Infrastructure Protection," International Journal of Information Security and Cybercrime, vol. 6, no. 2, pp. 47-52, 2017. Available: https://www.ijisc.comCOMAN, I.M., 'Cross-Border Cyber-Attacks and Critical Infrastructure Protection', International Journal of Information Security and Cybercrime, vol. 6, no. 2, 47-52, (2017).COMAN, I.M.: Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime 6 (2017) 47-52. https://www.ijisc.comCOMAN, I.M., (2017), Cross-Border Cyber-Attacks and Critical Infrastructure Protection. International Journal of Information Security and Cybercrime, 6: 47-52. https://www.ijisc.com Citation Format :