ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G., (2018). Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7(1), 11-22. Retrieve from https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 2018. Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7(1), 11-22. Available from: https://www.ijisc.comM.C. ŞCHEAU, A.L. ARSENE, G. POPESCU, "Artificial Intelligence/Machine Learning Challenges and Evolution," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 11-22, 2018. Available: https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., 'Artificial Intelligence/Machine Learning Challenges and Evolution', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 11-22, (2018).ŞCHEAU, M.C.,ARSENE, A.L.,POPESCU, G.,: Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime 7 (2018) 11-22. https://www.ijisc.comŞCHEAU, M.C., ARSENE, A.L., POPESCU, G., (2018), Artificial Intelligence/Machine Learning Challenges and Evolution. International Journal of Information Security and Cybercrime, 7: 11-22. https://www.ijisc.com Citation Format :
CRĂCIUN, A.M. (2018). Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7(1), 23-31. Retrieve from https://www.ijisc.comCRĂCIUN, A.M., 2018. Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7(1), 23-31. Available from: https://www.ijisc.comA.M. CRĂCIUN, "Threats and Risks to Telecommunications Systems," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 23-31, 2018. Available: https://www.ijisc.comCRĂCIUN, A.M., 'Threats and Risks to Telecommunications Systems', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 23-31, (2018).CRĂCIUN, A.M.: Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime 7 (2018) 23-31. https://www.ijisc.comCRĂCIUN, A.M., (2018), Threats and Risks to Telecommunications Systems. International Journal of Information Security and Cybercrime, 7: 23-31. https://www.ijisc.com Citation Format :
COMAN, I.M. (2018). Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime, 7(1), 32-36. Retrieve from https://www.ijisc.comCOMAN, I.M., 2018. Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime 7(1), 32-36. Available from: https://www.ijisc.comI.M. COMAN, "Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 32-36, 2018. Available: https://www.ijisc.comCOMAN, I.M., 'Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 32-36, (2018).COMAN, I.M.: Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime 7 (2018) 32-36. https://www.ijisc.comCOMAN, I.M., (2018), Technology as Competitive Advantage in Intelligence and Facilitator of Security Cooperation. International Journal of Information Security and Cybercrime, 7: 32-36. https://www.ijisc.com Citation Format :
VASILE, C.M. (2018). Firewall Technologies. International Journal of Information Security and Cybercrime, 7(1), 37-44. Retrieve from https://www.ijisc.comVASILE, C.M., 2018. Firewall Technologies. International Journal of Information Security and Cybercrime 7(1), 37-44. Available from: https://www.ijisc.comC.M. VASILE, "Firewall Technologies," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 37-44, 2018. Available: https://www.ijisc.comVASILE, C.M., 'Firewall Technologies', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 37-44, (2018).VASILE, C.M.: Firewall Technologies. International Journal of Information Security and Cybercrime 7 (2018) 37-44. https://www.ijisc.comVASILE, C.M., (2018), Firewall Technologies. International Journal of Information Security and Cybercrime, 7: 37-44. https://www.ijisc.com Citation Format :
CERNOV, A.M. (2018). Security in Computer Networks. International Journal of Information Security and Cybercrime, 7(1), 45-52. Retrieve from https://www.ijisc.comCERNOV, A.M., 2018. Security in Computer Networks. International Journal of Information Security and Cybercrime 7(1), 45-52. Available from: https://www.ijisc.comA.M. CERNOV, "Security in Computer Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 1, pp. 45-52, 2018. Available: https://www.ijisc.comCERNOV, A.M., 'Security in Computer Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 1, 45-52, (2018).CERNOV, A.M.: Security in Computer Networks. International Journal of Information Security and Cybercrime 7 (2018) 45-52. https://www.ijisc.comCERNOV, A.M., (2018), Security in Computer Networks. International Journal of Information Security and Cybercrime, 7: 45-52. https://www.ijisc.com Citation Format :