IJISC
  • Indexed in

  • Latest News

    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
    June 29, 2017
    Volume 6, Issue 1 of IJISC – International Journal of Information Security and Cybercrime was published
    May 5, 2017
    IJISC was indexed in CEEOL (Central and Eastern European Online Library) database
  • --- More News ---
  • Popular Articles

  • Volume 6, Issue 2, Year 2017

    IJISC
    Volume 6, Issue 2, Year 2017

    Published: December 2017
    Acceptance rate: 27%

    No. of scientific articles: 7
    No. of total articles: 12
    View IssuePlus

    ISSN: 2285-9225
    e-ISSN: 2286-0096
    DOI: 10.19107/IJISC.2017.02



    Table of Contents

    Cyber-Related Fraud Incidents in Malaysia. A Seven-Year Analysis of MyCERT Data

    Author(s): HASHIM, Mohd. Shamir; RAHMAN, Noraini Abdul; ZIN, Ahmad Nasir Udin Mohd.; MAHAMAD, Khairul Akma; AHMAD, Fauzan Amrullah
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.02.01
    Pages: 9-16
    AbstractPlus | Quick view | Full article | Citations


    The Evolution Through the Development of the Securing of the Simple Romanian Electronic Passport

    Author(s): BĂDIŢĂ, Aurelian Gabriel
    Section: Advances in Information Security Research
    Digital Object Identifier: 10.19107/IJISC.2017.02.02
    Pages: 17-22
    AbstractPlus | Quick view | Full article | Citations


    Browsers Cookies – An (In)security Analysis

    Author(s): AXINTE, Sabina-Daniela; PETRICĂ, Gabriel; BACIVAROV, Ioan
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.02.03
    Pages: 23-26
    AbstractPlus | Quick view | Full article | Citations


    Transaction Security in Online Banking and e-Commerce

    Author(s): ANGHEL, Mihai-Ciprian
    Section: Studies and Analysis of Cybercrime Phenomenon
    Digital Object Identifier: 10.19107/IJISC.2017.02.04
    Pages: 27-34
    AbstractPlus | Quick view | Full article | Citations


    Cyber Terrorism – A Growing Threat in the Field of Cyber Security

    Author(s): BEŞLIU, Dan-Călin
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.02.05
    Pages: 35-39
    AbstractPlus | Quick view | Full article | Citations


    Solutions for Network Traffic Security: VPN Through IPsec and PKI

    Author(s): PAULIȘ, Mihai-Alexandru
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.02.06
    Pages: 40-46
    AbstractPlus | Quick view | Full article | Citations


    Cross-Border Cyber-Attacks and Critical Infrastructure Protection

    Author(s): COMAN, Iulian Marius
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Digital Object Identifier: 10.19107/IJISC.2017.02.07
    Pages: 47-52
    AbstractPlus | Quick view | Full article | Citations


    Interview with Professor Emeritus Alessandro Birolini

    Author(s): BACIVAROV, Ioan
    Section: Interviews with experts
    Pages: 53-58
    View article | Download PDF

    International Conference on Computational Strategies for Next Generation Technologies

    Author(s): MIHAI, Ioan-Cosmin
    Section: Books Reviews and Conferences Analysis
    Pages: 59-60
    View article | Download PDF

    FIBO Application – Official Launch Event

    Author(s): PETRICĂ, Gabriel
    Section: Books Reviews and Conferences Analysis
    Pages: 61-62
    View article | Download PDF

    CEPOL Research and Science Conference – Innovation in Law Enforcement

    Author(s): MIHAI, Ioan-Cosmin
    Section: Books Reviews and Conferences Analysis
    Pages: 63-64
    View article | Download PDF

    OWASP Bucharest AppSec Conference 2017

    Author(s): NICA, Cristina; BARBU, Ionuț-Daniel
    Section: Books Reviews and Conferences Analysis
    Pages: 65-66
    View article | Download PDF