PASCARIU, C.,BARBU, I.D.,BACIVAROV, I., (2018). Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7(2), 9-13. Retrieve from https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 2018. Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7(2), 9-13. Available from: https://www.ijisc.comC. PASCARIU, I.D. BARBU, I. BACIVAROV, "Using Embedded Platforms to Monitor Network Security," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 9-13, 2018. Available: https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., 'Using Embedded Platforms to Monitor Network Security', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 9-13, (2018).PASCARIU, C.,BARBU, I.D.,BACIVAROV, I.,: Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime 7 (2018) 9-13. https://www.ijisc.comPASCARIU, C., BARBU, I.D., BACIVAROV, I., (2018), Using Embedded Platforms to Monitor Network Security. International Journal of Information Security and Cybercrime, 7: 9-13. https://www.ijisc.com Citation Format :
VLAD, I.M. (2018). Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7(2), 14-24. Retrieve from https://www.ijisc.comVLAD, I.M., 2018. Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7(2), 14-24. Available from: https://www.ijisc.comI.M. VLAD, "Security of Personal Data in Social Networks," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 14-24, 2018. Available: https://www.ijisc.comVLAD, I.M., 'Security of Personal Data in Social Networks', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 14-24, (2018).VLAD, I.M.: Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime 7 (2018) 14-24. https://www.ijisc.comVLAD, I.M., (2018), Security of Personal Data in Social Networks. International Journal of Information Security and Cybercrime, 7: 14-24. https://www.ijisc.com Citation Format :
POPESCU, I. (2018). The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7(2), 25-32. Retrieve from https://www.ijisc.comPOPESCU, I., 2018. The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7(2), 25-32. Available from: https://www.ijisc.comI. POPESCU, "The Influence of Vulnerabilities on the Information Systems and Methods of Prevention," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 25-32, 2018. Available: https://www.ijisc.comPOPESCU, I., 'The Influence of Vulnerabilities on the Information Systems and Methods of Prevention', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 25-32, (2018).POPESCU, I.: The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime 7 (2018) 25-32. https://www.ijisc.comPOPESCU, I., (2018), The Influence of Vulnerabilities on the Information Systems and Methods of Prevention. International Journal of Information Security and Cybercrime, 7: 25-32. https://www.ijisc.com Citation Format :
BOROȘEANU, E.I. (2018). Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime, 7(2), 33-40. Retrieve from https://www.ijisc.comBOROȘEANU, E.I., 2018. Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime 7(2), 33-40. Available from: https://www.ijisc.comE.I. BOROȘEANU, "Wi-Fi Security Dedicated Architectures," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 33-40, 2018. Available: https://www.ijisc.comBOROȘEANU, E.I., 'Wi-Fi Security Dedicated Architectures', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 33-40, (2018).BOROȘEANU, E.I.: Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime 7 (2018) 33-40. https://www.ijisc.comBOROȘEANU, E.I., (2018), Wi-Fi Security Dedicated Architectures. International Journal of Information Security and Cybercrime, 7: 33-40. https://www.ijisc.com Citation Format :
MAREȘ, M.S. (2018). Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7(2), 41-51. Retrieve from https://www.ijisc.comMAREȘ, M.S., 2018. Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7(2), 41-51. Available from: https://www.ijisc.comM.S. MAREȘ, "Solutions to Secure a Network," International Journal of Information Security and Cybercrime, vol. 7, no. 2, pp. 41-51, 2018. Available: https://www.ijisc.comMAREȘ, M.S., 'Solutions to Secure a Network', International Journal of Information Security and Cybercrime, vol. 7, no. 2, 41-51, (2018).MAREȘ, M.S.: Solutions to Secure a Network. International Journal of Information Security and Cybercrime 7 (2018) 41-51. https://www.ijisc.comMAREȘ, M.S., (2018), Solutions to Secure a Network. International Journal of Information Security and Cybercrime, 7: 41-51. https://www.ijisc.com Citation Format :