The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: December 2023
Acceptance rate: 39%
No. of scientific articles: 6
No. of total articles: 9 View IssuePlus
GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M., (2023). A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12(2), 9-22. Retrieve from https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 2023. A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12(2), 9-22. Available from: https://www.ijisc.comT.A. GIWA, O.I. ABIODUN, A.E. OMOLARA, R.M. ISIAKA, "A Hybridized Honey Encryption for Data Security using Residue Number System," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 9-22, 2023. Available: https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., 'A Hybridized Honey Encryption for Data Security using Residue Number System', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 9-22, (2023).GIWA, T.A.,ABIODUN, O.I.,OMOLARA, A.E.,ISIAKA, R.M.,: A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime 12 (2023) 9-22. https://www.ijisc.comGIWA, T.A., ABIODUN, O.I., OMOLARA, A.E., ISIAKA, R.M., (2023), A Hybridized Honey Encryption for Data Security using Residue Number System. International Journal of Information Security and Cybercrime, 12: 9-22. https://www.ijisc.com Citation Format :
TOD-RĂILEANU, G.,BACIVAROV, I., (2023). An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime, 12(2), 23-26. Retrieve from https://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., 2023. An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime 12(2), 23-26. Available from: https://www.ijisc.comG. TOD-RĂILEANU, I. BACIVAROV, "An Overview on Artificial Intelligence Applied in Offensive Cybersecurity," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 23-26, 2023. Available: https://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., 'An Overview on Artificial Intelligence Applied in Offensive Cybersecurity', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 23-26, (2023).TOD-RĂILEANU, G.,BACIVAROV, I.,: An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime 12 (2023) 23-26. https://www.ijisc.comTOD-RĂILEANU, G., BACIVAROV, I., (2023), An Overview on Artificial Intelligence Applied in Offensive Cybersecurity. International Journal of Information Security and Cybercrime, 12: 23-26. https://www.ijisc.com Citation Format :
MWENDA, A.,NGODYA, D., (2023). A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime, 12(2), 27-34. Retrieve from https://www.ijisc.comMWENDA, A., NGODYA, D., 2023. A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime 12(2), 27-34. Available from: https://www.ijisc.comA. MWENDA, D. NGODYA, "A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter)," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 27-34, 2023. Available: https://www.ijisc.comMWENDA, A., NGODYA, D., 'A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter)', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 27-34, (2023).MWENDA, A.,NGODYA, D.,: A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime 12 (2023) 27-34. https://www.ijisc.comMWENDA, A., NGODYA, D., (2023), A Review of SCADA IoT Device Vulnerabilities in the Power Grid (A Case Study of Smart Meter). International Journal of Information Security and Cybercrime, 12: 27-34. https://www.ijisc.com Citation Format :
DESPA, A.R. (2023). Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime, 12(2), 35-42. Retrieve from https://www.ijisc.comDESPA, A.R., 2023. Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime 12(2), 35-42. Available from: https://www.ijisc.comA.R. DESPA, "Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 35-42, 2023. Available: https://www.ijisc.comDESPA, A.R., 'Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 35-42, (2023).DESPA, A.R.: Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime 12 (2023) 35-42. https://www.ijisc.comDESPA, A.R., (2023), Overcoming Obstacles: A Closer Look at the Most Pressing Challenges in Cybersecurity. International Journal of Information Security and Cybercrime, 12: 35-42. https://www.ijisc.com Citation Format :
SHAHJAHAN, M.,MIAH, A.K., (2023). Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime, 12(2), 43-48. Retrieve from https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., 2023. Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime 12(2), 43-48. Available from: https://www.ijisc.comM. SHAHJAHAN, A.K. MIAH, "Pattern of Cybercrime among Adolescents: An Exploratory Study," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 43-48, 2023. Available: https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., 'Pattern of Cybercrime among Adolescents: An Exploratory Study', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 43-48, (2023).SHAHJAHAN, M.,MIAH, A.K.,: Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime 12 (2023) 43-48. https://www.ijisc.comSHAHJAHAN, M., MIAH, A.K., (2023), Pattern of Cybercrime among Adolescents: An Exploratory Study. International Journal of Information Security and Cybercrime, 12: 43-48. https://www.ijisc.com Citation Format :
MIHALACHE, D.N. (2023). Cloud Penetration Testing. International Journal of Information Security and Cybercrime, 12(2), 49-54. Retrieve from https://www.ijisc.comMIHALACHE, D.N., 2023. Cloud Penetration Testing. International Journal of Information Security and Cybercrime 12(2), 49-54. Available from: https://www.ijisc.comD.N. MIHALACHE, "Cloud Penetration Testing," International Journal of Information Security and Cybercrime, vol. 12, no. 2, pp. 49-54, 2023. Available: https://www.ijisc.comMIHALACHE, D.N., 'Cloud Penetration Testing', International Journal of Information Security and Cybercrime, vol. 12, no. 2, 49-54, (2023).MIHALACHE, D.N.: Cloud Penetration Testing. International Journal of Information Security and Cybercrime 12 (2023) 49-54. https://www.ijisc.comMIHALACHE, D.N., (2023), Cloud Penetration Testing. International Journal of Information Security and Cybercrime, 12: 49-54. https://www.ijisc.com Citation Format :