The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: June 2025
Acceptance rate: 32%
No. of scientific articles: 6
No. of total articles: 8 View IssuePlus
PREDA, M.,POPESCU, V.,ARGINT, C.,IANCU, N.,RAICU, G.,ENE, G., (2025). Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise. International Journal of Information Security and Cybercrime, XIV(1), 11-27. Retrieve from https://www.ijisc.comPREDA, M., POPESCU, V., ARGINT, C., IANCU, N., RAICU, G., ENE, G., 2025. Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise. International Journal of Information Security and Cybercrime XIV(1), 11-27. Available from: https://www.ijisc.comM. PREDA, V. POPESCU, C. ARGINT, N. IANCU, G. RAICU, G. ENE, "Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise," International Journal of Information Security and Cybercrime, vol. XIV, no. 1, pp. 11-27, 2025. Available: https://www.ijisc.comPREDA, M., POPESCU, V., ARGINT, C., IANCU, N., RAICU, G., ENE, G., 'Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise', International Journal of Information Security and Cybercrime, vol. XIV, no. 1, 11-27, (2025).PREDA, M.,POPESCU, V.,ARGINT, C.,IANCU, N.,RAICU, G.,ENE, G.,: Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise. International Journal of Information Security and Cybercrime XIV (2025) 11-27. https://www.ijisc.comPREDA, M., POPESCU, V., ARGINT, C., IANCU, N., RAICU, G., ENE, G., (2025), Enhancing Civil-Military Cyber Resilience Lessons from the ECYBRIDGE Tabletop Exercise. International Journal of Information Security and Cybercrime, XIV: 11-27. https://www.ijisc.com Citation Format :
PRAYAGA, L.,PRAYAGA, C., (2025). Adaptive Federated Learning with Generative AI for Privacy-Preserving Healthcare. International Journal of Information Security and Cybercrime, XIV(1), 28-36. Retrieve from https://www.ijisc.comPRAYAGA, L., PRAYAGA, C., 2025. Adaptive Federated Learning with Generative AI for Privacy-Preserving Healthcare. International Journal of Information Security and Cybercrime XIV(1), 28-36. Available from: https://www.ijisc.comL. PRAYAGA, C. PRAYAGA, "Adaptive Federated Learning with Generative AI for Privacy-Preserving Healthcare," International Journal of Information Security and Cybercrime, vol. XIV, no. 1, pp. 28-36, 2025. Available: https://www.ijisc.comPRAYAGA, L., PRAYAGA, C., 'Adaptive Federated Learning with Generative AI for Privacy-Preserving Healthcare', International Journal of Information Security and Cybercrime, vol. XIV, no. 1, 28-36, (2025).PRAYAGA, L.,PRAYAGA, C.,: Adaptive Federated Learning with Generative AI for Privacy-Preserving Healthcare. International Journal of Information Security and Cybercrime XIV (2025) 28-36. https://www.ijisc.comPRAYAGA, L., PRAYAGA, C., (2025), Adaptive Federated Learning with Generative AI for Privacy-Preserving Healthcare. International Journal of Information Security and Cybercrime, XIV: 28-36. https://www.ijisc.com Citation Format :
LUOMALA, M. (2025). A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland. International Journal of Information Security and Cybercrime, XIV(1), 37-62. Retrieve from https://www.ijisc.comLUOMALA, M., 2025. A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland. International Journal of Information Security and Cybercrime XIV(1), 37-62. Available from: https://www.ijisc.comM. LUOMALA, "A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland," International Journal of Information Security and Cybercrime, vol. XIV, no. 1, pp. 37-62, 2025. Available: https://www.ijisc.comLUOMALA, M., 'A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland', International Journal of Information Security and Cybercrime, vol. XIV, no. 1, 37-62, (2025).LUOMALA, M.: A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland. International Journal of Information Security and Cybercrime XIV (2025) 37-62. https://www.ijisc.comLUOMALA, M., (2025), A New Version of Cybercrime Taxonomy: Empirical Evidence from Finland. International Journal of Information Security and Cybercrime, XIV: 37-62. https://www.ijisc.com Citation Format :
GULPHAM, S.,RAVAL, D.T.,SHEKHAR, P., (2025). Sextortion Crime in the Digital Infosphere. International Journal of Information Security and Cybercrime, XIV(1), 63-75. Retrieve from https://www.ijisc.comGULPHAM, S., RAVAL, D.T., SHEKHAR, P., 2025. Sextortion Crime in the Digital Infosphere. International Journal of Information Security and Cybercrime XIV(1), 63-75. Available from: https://www.ijisc.comS. GULPHAM, D.T. RAVAL, P. SHEKHAR, "Sextortion Crime in the Digital Infosphere," International Journal of Information Security and Cybercrime, vol. XIV, no. 1, pp. 63-75, 2025. Available: https://www.ijisc.comGULPHAM, S., RAVAL, D.T., SHEKHAR, P., 'Sextortion Crime in the Digital Infosphere', International Journal of Information Security and Cybercrime, vol. XIV, no. 1, 63-75, (2025).GULPHAM, S.,RAVAL, D.T.,SHEKHAR, P.,: Sextortion Crime in the Digital Infosphere. International Journal of Information Security and Cybercrime XIV (2025) 63-75. https://www.ijisc.comGULPHAM, S., RAVAL, D.T., SHEKHAR, P., (2025), Sextortion Crime in the Digital Infosphere. International Journal of Information Security and Cybercrime, XIV: 63-75. https://www.ijisc.com Citation Format :
SWAPNA, S.,SIVALINGAM, V., (2025). AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis. International Journal of Information Security and Cybercrime, XIV(1), 76-87. Retrieve from https://www.ijisc.comSWAPNA, S., SIVALINGAM, V., 2025. AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis. International Journal of Information Security and Cybercrime XIV(1), 76-87. Available from: https://www.ijisc.comS. SWAPNA, V. SIVALINGAM, "AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis," International Journal of Information Security and Cybercrime, vol. XIV, no. 1, pp. 76-87, 2025. Available: https://www.ijisc.comSWAPNA, S., SIVALINGAM, V., 'AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis', International Journal of Information Security and Cybercrime, vol. XIV, no. 1, 76-87, (2025).SWAPNA, S.,SIVALINGAM, V.,: AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis. International Journal of Information Security and Cybercrime XIV (2025) 76-87. https://www.ijisc.comSWAPNA, S., SIVALINGAM, V., (2025), AI Integration and Its Impact on Cyber Defense: A Theoretical Analysis. International Journal of Information Security and Cybercrime, XIV: 76-87. https://www.ijisc.com Citation Format :
CHOI, S.,JUNG, B.R.,PARK, S.M., (2025). Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis. International Journal of Information Security and Cybercrime, XIV(1), 88-106. Retrieve from https://www.ijisc.comCHOI, S., JUNG, B.R., PARK, S.M., 2025. Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis. International Journal of Information Security and Cybercrime XIV(1), 88-106. Available from: https://www.ijisc.comS. CHOI, B.R. JUNG, S.M. PARK, "Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis," International Journal of Information Security and Cybercrime, vol. XIV, no. 1, pp. 88-106, 2025. Available: https://www.ijisc.comCHOI, S., JUNG, B.R., PARK, S.M., 'Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis', International Journal of Information Security and Cybercrime, vol. XIV, no. 1, 88-106, (2025).CHOI, S.,JUNG, B.R.,PARK, S.M.,: Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis. International Journal of Information Security and Cybercrime XIV (2025) 88-106. https://www.ijisc.comCHOI, S., JUNG, B.R., PARK, S.M., (2025), Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis. International Journal of Information Security and Cybercrime, XIV: 88-106. https://www.ijisc.com Citation Format :