The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: June 2022
Acceptance rate: 39%
No. of scientific articles: 6
No. of total articles: 9 View IssuePlus
GĂBUDEANU, L. (2022). Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime, 11(1), 9-14. Retrieve from https://www.ijisc.comGĂBUDEANU, L., 2022. Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime 11(1), 9-14. Available from: https://www.ijisc.comL. GĂBUDEANU, "Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 9-14, 2022. Available: https://www.ijisc.comGĂBUDEANU, L., 'Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 9-14, (2022).GĂBUDEANU, L.: Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime 11 (2022) 9-14. https://www.ijisc.comGĂBUDEANU, L., (2022), Trends in Interpretation of EU Data Protection Authorities of Cybersecurity Requirements Under the GDPR. International Journal of Information Security and Cybercrime, 11: 9-14. https://www.ijisc.com Citation Format :
DUMITRU, I.A. (2022). Classification of Information. International Journal of Information Security and Cybercrime, 11(1), 15-24. Retrieve from https://www.ijisc.comDUMITRU, I.A., 2022. Classification of Information. International Journal of Information Security and Cybercrime 11(1), 15-24. Available from: https://www.ijisc.comI.A. DUMITRU, "Classification of Information," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 15-24, 2022. Available: https://www.ijisc.comDUMITRU, I.A., 'Classification of Information', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 15-24, (2022).DUMITRU, I.A.: Classification of Information. International Journal of Information Security and Cybercrime 11 (2022) 15-24. https://www.ijisc.comDUMITRU, I.A., (2022), Classification of Information. International Journal of Information Security and Cybercrime, 11: 15-24. https://www.ijisc.com Citation Format :
PASCARIU, C. (2022). Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime, 11(1), 25-30. Retrieve from https://www.ijisc.comPASCARIU, C., 2022. Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime 11(1), 25-30. Available from: https://www.ijisc.comC. PASCARIU, "Getting Started with Vulnerability Disclosure and Bug Bounty Programs," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 25-30, 2022. Available: https://www.ijisc.comPASCARIU, C., 'Getting Started with Vulnerability Disclosure and Bug Bounty Programs', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 25-30, (2022).PASCARIU, C.: Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime 11 (2022) 25-30. https://www.ijisc.comPASCARIU, C., (2022), Getting Started with Vulnerability Disclosure and Bug Bounty Programs. International Journal of Information Security and Cybercrime, 11: 25-30. https://www.ijisc.com Citation Format :
AHUBELE, B.,UGBARI, A., (2022). Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11(1), 31-40. Retrieve from https://www.ijisc.comAHUBELE, B., UGBARI, A., 2022. Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11(1), 31-40. Available from: https://www.ijisc.comB. AHUBELE, A. UGBARI, "Data Protection for Users in Cloud Computing," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 31-40, 2022. Available: https://www.ijisc.comAHUBELE, B., UGBARI, A., 'Data Protection for Users in Cloud Computing', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 31-40, (2022).AHUBELE, B.,UGBARI, A.,: Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime 11 (2022) 31-40. https://www.ijisc.comAHUBELE, B., UGBARI, A., (2022), Data Protection for Users in Cloud Computing. International Journal of Information Security and Cybercrime, 11: 31-40. https://www.ijisc.com Citation Format :
OPRIȘ, C.O. (2022). Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime, 11(1), 41-48. Retrieve from https://www.ijisc.comOPRIȘ, C.O., 2022. Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime 11(1), 41-48. Available from: https://www.ijisc.comC.O. OPRIȘ, "Cybercrime Evolution and Current Threats," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 41-48, 2022. Available: https://www.ijisc.comOPRIȘ, C.O., 'Cybercrime Evolution and Current Threats', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 41-48, (2022).OPRIȘ, C.O.: Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime 11 (2022) 41-48. https://www.ijisc.comOPRIȘ, C.O., (2022), Cybercrime Evolution and Current Threats. International Journal of Information Security and Cybercrime, 11: 41-48. https://www.ijisc.com Citation Format :
CHATTAMVELLI, R. (2022). A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11(1), 49-58. Retrieve from https://www.ijisc.comCHATTAMVELLI, R., 2022. A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11(1), 49-58. Available from: https://www.ijisc.comR. CHATTAMVELLI, "A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256," International Journal of Information Security and Cybercrime, vol. 11, no. 1, pp. 49-58, 2022. Available: https://www.ijisc.comCHATTAMVELLI, R., 'A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256', International Journal of Information Security and Cybercrime, vol. 11, no. 1, 49-58, (2022).CHATTAMVELLI, R.: A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime 11 (2022) 49-58. https://www.ijisc.comCHATTAMVELLI, R., (2022), A Symmetric Scheme for Securing Data in Cyber-Physical Systems / IoT Sensor-Based Systems based on AES and SHA256. International Journal of Information Security and Cybercrime, 11: 49-58. https://www.ijisc.com Citation Format :