The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: December 2024
Acceptance rate: 31%
No. of scientific articles: 6
No. of total articles: 8 View IssuePlus
MUPPA, K.R. (2024). Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime, 13(2), 9-17. Retrieve from https://www.ijisc.comMUPPA, K.R., 2024. Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime 13(2), 9-17. Available from: https://www.ijisc.comK.R. MUPPA, "Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 9-17, 2024. Available: https://www.ijisc.comMUPPA, K.R., 'Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 9-17, (2024).MUPPA, K.R.: Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime 13 (2024) 9-17. https://www.ijisc.comMUPPA, K.R., (2024), Enhanced Identity and Access Management with Artificial Intelligence: A Strategic Overview. International Journal of Information Security and Cybercrime, 13: 9-17. https://www.ijisc.com Citation Format :
BELCIU (VASILESCU), A.C.,PREDA, M., (2024). Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime, 13(2), 18-32. Retrieve from https://www.ijisc.comBELCIU (VASILESCU), A.C., PREDA, M., 2024. Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime 13(2), 18-32. Available from: https://www.ijisc.comA.C. BELCIU (VASILESCU), M. PREDA, "Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 18-32, 2024. Available: https://www.ijisc.comBELCIU (VASILESCU), A.C., PREDA, M., 'Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 18-32, (2024).BELCIU (VASILESCU), A.C.,PREDA, M.,: Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime 13 (2024) 18-32. https://www.ijisc.comBELCIU (VASILESCU), A.C., PREDA, M., (2024), Cyber Resilience Under the EU Framework: Insights from an Applied Case Study on Critical Sectors. International Journal of Information Security and Cybercrime, 13: 18-32. https://www.ijisc.com Citation Format :
FAYE, S.,ABDULRAHMAN, J.,TALB, R.A.,MARTIN, R.J., (2024). Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime, 13(2), 33-45. Retrieve from https://www.ijisc.comFAYE, S., ABDULRAHMAN, J., TALB, R.A., MARTIN, R.J., 2024. Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime 13(2), 33-45. Available from: https://www.ijisc.comS. FAYE, J. ABDULRAHMAN, R.A. TALB, R.J. MARTIN, "Cybersecurity in Aviation: A Case-Based Approach to Preparedness," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 33-45, 2024. Available: https://www.ijisc.comFAYE, S., ABDULRAHMAN, J., TALB, R.A., MARTIN, R.J., 'Cybersecurity in Aviation: A Case-Based Approach to Preparedness', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 33-45, (2024).FAYE, S.,ABDULRAHMAN, J.,TALB, R.A.,MARTIN, R.J.,: Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime 13 (2024) 33-45. https://www.ijisc.comFAYE, S., ABDULRAHMAN, J., TALB, R.A., MARTIN, R.J., (2024), Cybersecurity in Aviation: A Case-Based Approach to Preparedness. International Journal of Information Security and Cybercrime, 13: 33-45. https://www.ijisc.com Citation Format :
ARGHIRESCU, S.A.,PETRICĂ, G., (2024). Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime, 13(2), 46-51. Retrieve from https://www.ijisc.comARGHIRESCU, S.A., PETRICĂ, G., 2024. Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime 13(2), 46-51. Available from: https://www.ijisc.comS.A. ARGHIRESCU, G. PETRICĂ, "Securing Multimedia Content Using Digital Rights Management," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 46-51, 2024. Available: https://www.ijisc.comARGHIRESCU, S.A., PETRICĂ, G., 'Securing Multimedia Content Using Digital Rights Management', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 46-51, (2024).ARGHIRESCU, S.A.,PETRICĂ, G.,: Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime 13 (2024) 46-51. https://www.ijisc.comARGHIRESCU, S.A., PETRICĂ, G., (2024), Securing Multimedia Content Using Digital Rights Management. International Journal of Information Security and Cybercrime, 13: 46-51. https://www.ijisc.com Citation Format :
DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I., (2024). Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime, 13(2), 52-58. Retrieve from https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 2024. Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime 13(2), 52-58. Available from: https://www.ijisc.comA.M. DINCĂ, S.D. AXINTE, I. BACIVAROV, "Trust and Security in AI-Generated Documentation," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 52-58, 2024. Available: https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., 'Trust and Security in AI-Generated Documentation', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 52-58, (2024).DINCĂ, A.M.,AXINTE, S.D.,BACIVAROV, I.,: Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime 13 (2024) 52-58. https://www.ijisc.comDINCĂ, A.M., AXINTE, S.D., BACIVAROV, I., (2024), Trust and Security in AI-Generated Documentation. International Journal of Information Security and Cybercrime, 13: 52-58. https://www.ijisc.com Citation Format :
MĂCSINOIU, V.E. (2024). Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime, 13(2), 59-64. Retrieve from https://www.ijisc.comMĂCSINOIU, V.E., 2024. Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime 13(2), 59-64. Available from: https://www.ijisc.comV.E. MĂCSINOIU, "Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies," International Journal of Information Security and Cybercrime, vol. 13, no. 2, pp. 59-64, 2024. Available: https://www.ijisc.comMĂCSINOIU, V.E., 'Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies', International Journal of Information Security and Cybercrime, vol. 13, no. 2, 59-64, (2024).MĂCSINOIU, V.E.: Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime 13 (2024) 59-64. https://www.ijisc.comMĂCSINOIU, V.E., (2024), Unveiling User Enumeration Attacks: Methods, Impacts and Mitigation Strategies. International Journal of Information Security and Cybercrime, 13: 59-64. https://www.ijisc.com Citation Format :