ABDULHAMID, M.,GICHUKI, N., (2019). Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8(1), 13-22. Retrieve from https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 2019. Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8(1), 13-22. Available from: https://www.ijisc.comM. ABDULHAMID, N. GICHUKI, "Comparative Study of Cryptographic Algorithms," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 13-22, 2019. Available: https://www.ijisc.comABDULHAMID, M., GICHUKI, N., 'Comparative Study of Cryptographic Algorithms', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 13-22, (2019).ABDULHAMID, M.,GICHUKI, N.,: Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime 8 (2019) 13-22. https://www.ijisc.comABDULHAMID, M., GICHUKI, N., (2019), Comparative Study of Cryptographic Algorithms. International Journal of Information Security and Cybercrime, 8: 13-22. https://www.ijisc.com Citation Format :
DJEROUNI, M. (2019). Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime, 8(1), 23-29. Retrieve from https://www.ijisc.comDJEROUNI, M., 2019. Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime 8(1), 23-29. Available from: https://www.ijisc.comM. DJEROUNI, "Implication of Employees in Security Policies Definition," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 23-29, 2019. Available: https://www.ijisc.comDJEROUNI, M., 'Implication of Employees in Security Policies Definition', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 23-29, (2019).DJEROUNI, M.: Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime 8 (2019) 23-29. https://www.ijisc.comDJEROUNI, M., (2019), Implication of Employees in Security Policies Definition. International Journal of Information Security and Cybercrime, 8: 23-29. https://www.ijisc.com Citation Format :
GOLDMAN, E. (2019). Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime, 8(1), 30-34. Retrieve from https://www.ijisc.comGOLDMAN, E., 2019. Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime 8(1), 30-34. Available from: https://www.ijisc.comE. GOLDMAN, "Push the Button: Making Security Training Fun and Interactive," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 30-34, 2019. Available: https://www.ijisc.comGOLDMAN, E., 'Push the Button: Making Security Training Fun and Interactive', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 30-34, (2019).GOLDMAN, E.: Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime 8 (2019) 30-34. https://www.ijisc.comGOLDMAN, E., (2019), Push the Button: Making Security Training Fun and Interactive. International Journal of Information Security and Cybercrime, 8: 30-34. https://www.ijisc.com Citation Format :
HAGGMAN, A. (2019). Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime, 8(1), 35-38. Retrieve from https://www.ijisc.comHAGGMAN, A., 2019. Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime 8(1), 35-38. Available from: https://www.ijisc.comA. HAGGMAN, "Wargaming in Cyber Security Education and Awareness Training," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 35-38, 2019. Available: https://www.ijisc.comHAGGMAN, A., 'Wargaming in Cyber Security Education and Awareness Training', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 35-38, (2019).HAGGMAN, A.: Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime 8 (2019) 35-38. https://www.ijisc.comHAGGMAN, A., (2019), Wargaming in Cyber Security Education and Awareness Training. International Journal of Information Security and Cybercrime, 8: 35-38. https://www.ijisc.com Citation Format :
ARAUJO MACEDO, C.,MENTING, J., (2019). Building a Cybersecurity Culture in the Industrial Control System Environment. International Journal of Information Security and Cybercrime, 8(1), 39-44. Retrieve from https://www.ijisc.comARAUJO MACEDO, C., MENTING, J., 2019. Building a Cybersecurity Culture in the Industrial Control System Environment. International Journal of Information Security and Cybercrime 8(1), 39-44. Available from: https://www.ijisc.comC. ARAUJO MACEDO, J. MENTING, "Building a Cybersecurity Culture in the Industrial Control System Environment," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 39-44, 2019. Available: https://www.ijisc.comARAUJO MACEDO, C., MENTING, J., 'Building a Cybersecurity Culture in the Industrial Control System Environment', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 39-44, (2019).ARAUJO MACEDO, C.,MENTING, J.,: Building a Cybersecurity Culture in the Industrial Control System Environment. International Journal of Information Security and Cybercrime 8 (2019) 39-44. https://www.ijisc.comARAUJO MACEDO, C., MENTING, J., (2019), Building a Cybersecurity Culture in the Industrial Control System Environment. International Journal of Information Security and Cybercrime, 8: 39-44. https://www.ijisc.com Citation Format :
BISEGNA, A.,CARBONE, R.,MARTINI, I.,ODORIZZI, V.,PELLIZZARI, G.,RANISE, S., (2019). Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices. International Journal of Information Security and Cybercrime, 8(1), 45-50. Retrieve from https://www.ijisc.comBISEGNA, A., CARBONE, R., MARTINI, I., ODORIZZI, V., PELLIZZARI, G., RANISE, S., 2019. Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices. International Journal of Information Security and Cybercrime 8(1), 45-50. Available from: https://www.ijisc.comA. BISEGNA, R. CARBONE, I. MARTINI, V. ODORIZZI, G. PELLIZZARI, S. RANISE, "Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 45-50, 2019. Available: https://www.ijisc.comBISEGNA, A., CARBONE, R., MARTINI, I., ODORIZZI, V., PELLIZZARI, G., RANISE, S., 'Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 45-50, (2019).BISEGNA, A.,CARBONE, R.,MARTINI, I.,ODORIZZI, V.,PELLIZZARI, G.,RANISE, S.,: Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices. International Journal of Information Security and Cybercrime 8 (2019) 45-50. https://www.ijisc.comBISEGNA, A., CARBONE, R., MARTINI, I., ODORIZZI, V., PELLIZZARI, G., RANISE, S., (2019), Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices. International Journal of Information Security and Cybercrime, 8: 45-50. https://www.ijisc.com Citation Format :
CAMPEAN, S. (2019). The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime, 8(1), 51-58. Retrieve from https://www.ijisc.comCAMPEAN, S., 2019. The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime 8(1), 51-58. Available from: https://www.ijisc.comS. CAMPEAN, "The Human Factor at the Center of a Cyber Security Culture," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 51-58, 2019. Available: https://www.ijisc.comCAMPEAN, S., 'The Human Factor at the Center of a Cyber Security Culture', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 51-58, (2019).CAMPEAN, S.: The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime 8 (2019) 51-58. https://www.ijisc.comCAMPEAN, S., (2019), The Human Factor at the Center of a Cyber Security Culture. International Journal of Information Security and Cybercrime, 8: 51-58. https://www.ijisc.com Citation Format :
YAMIN, M.M.,KATT, B., (2019). Cyber Security Skill Set Analysis for Common Curricula Development. International Journal of Information Security and Cybercrime, 8(1), 59-64. Retrieve from https://www.ijisc.comYAMIN, M.M., KATT, B., 2019. Cyber Security Skill Set Analysis for Common Curricula Development. International Journal of Information Security and Cybercrime 8(1), 59-64. Available from: https://www.ijisc.comM.M. YAMIN, B. KATT, "Cyber Security Skill Set Analysis for Common Curricula Development," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 59-64, 2019. Available: https://www.ijisc.comYAMIN, M.M., KATT, B., 'Cyber Security Skill Set Analysis for Common Curricula Development', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 59-64, (2019).YAMIN, M.M.,KATT, B.,: Cyber Security Skill Set Analysis for Common Curricula Development. International Journal of Information Security and Cybercrime 8 (2019) 59-64. https://www.ijisc.comYAMIN, M.M., KATT, B., (2019), Cyber Security Skill Set Analysis for Common Curricula Development. International Journal of Information Security and Cybercrime, 8: 59-64. https://www.ijisc.com Citation Format :
PARASCHIVA, I. (2019). WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime, 8(1), 65-72. Retrieve from https://www.ijisc.comPARASCHIVA, I., 2019. WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime 8(1), 65-72. Available from: https://www.ijisc.comI. PARASCHIVA, "WannaCry Ransomware Attack from Romanian Police Perspective," International Journal of Information Security and Cybercrime, vol. 8, no. 1, pp. 65-72, 2019. Available: https://www.ijisc.comPARASCHIVA, I., 'WannaCry Ransomware Attack from Romanian Police Perspective', International Journal of Information Security and Cybercrime, vol. 8, no. 1, 65-72, (2019).PARASCHIVA, I.: WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime 8 (2019) 65-72. https://www.ijisc.comPARASCHIVA, I., (2019), WannaCry Ransomware Attack from Romanian Police Perspective. International Journal of Information Security and Cybercrime, 8: 65-72. https://www.ijisc.com Citation Format :