The International Journal of Information Security and Cybercrime (IJISC) is a biannual scientific publication.
Published: December 2025
Acceptance rate: 33%
No. of scientific articles: 6
No. of total articles: 9 View IssuePlus
HARALDSSON, A.,PADYAB, A.,AL SALEK, A., (2025). Bridging the Gap Between Businesses and Insurers: A Systematic Review of Cyber Insurance Research. International Journal of Information Security and Cybercrime, XIV(2), 9-24. Retrieve from https://www.ijisc.comHARALDSSON, A., PADYAB, A., AL SALEK, A., 2025. Bridging the Gap Between Businesses and Insurers: A Systematic Review of Cyber Insurance Research. International Journal of Information Security and Cybercrime XIV(2), 9-24. Available from: https://www.ijisc.comA. HARALDSSON, A. PADYAB, A. AL SALEK, "Bridging the Gap Between Businesses and Insurers: A Systematic Review of Cyber Insurance Research," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 9-24, 2025. Available: https://www.ijisc.comHARALDSSON, A., PADYAB, A., AL SALEK, A., 'Bridging the Gap Between Businesses and Insurers: A Systematic Review of Cyber Insurance Research', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 9-24, (2025).HARALDSSON, A.,PADYAB, A.,AL SALEK, A.,: Bridging the Gap Between Businesses and Insurers: A Systematic Review of Cyber Insurance Research. International Journal of Information Security and Cybercrime XIV (2025) 9-24. https://www.ijisc.comHARALDSSON, A., PADYAB, A., AL SALEK, A., (2025), Bridging the Gap Between Businesses and Insurers: A Systematic Review of Cyber Insurance Research. International Journal of Information Security and Cybercrime, XIV: 9-24. https://www.ijisc.com Citation Format :
AL-RAWI, M. (2025). Applications of ZigBee Protocol in Security System: Literature Survey. International Journal of Information Security and Cybercrime, XIV(2), 25-31. Retrieve from https://www.ijisc.comAL-RAWI, M., 2025. Applications of ZigBee Protocol in Security System: Literature Survey. International Journal of Information Security and Cybercrime XIV(2), 25-31. Available from: https://www.ijisc.comM. AL-RAWI, "Applications of ZigBee Protocol in Security System: Literature Survey," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 25-31, 2025. Available: https://www.ijisc.comAL-RAWI, M., 'Applications of ZigBee Protocol in Security System: Literature Survey', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 25-31, (2025).AL-RAWI, M.: Applications of ZigBee Protocol in Security System: Literature Survey. International Journal of Information Security and Cybercrime XIV (2025) 25-31. https://www.ijisc.comAL-RAWI, M., (2025), Applications of ZigBee Protocol in Security System: Literature Survey. International Journal of Information Security and Cybercrime, XIV: 25-31. https://www.ijisc.com Citation Format :
STĂNCIULESCU, A.,BACIVAROV, I., (2025). Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies. International Journal of Information Security and Cybercrime, XIV(2), 32-38. Retrieve from https://www.ijisc.comSTĂNCIULESCU, A., BACIVAROV, I., 2025. Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies. International Journal of Information Security and Cybercrime XIV(2), 32-38. Available from: https://www.ijisc.comA. STĂNCIULESCU, I. BACIVAROV, "Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 32-38, 2025. Available: https://www.ijisc.comSTĂNCIULESCU, A., BACIVAROV, I., 'Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 32-38, (2025).STĂNCIULESCU, A.,BACIVAROV, I.,: Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies. International Journal of Information Security and Cybercrime XIV (2025) 32-38. https://www.ijisc.comSTĂNCIULESCU, A., BACIVAROV, I., (2025), Software Supply Chain Resilience in 2025: A Comparative Analysis of Major Incidents Using OSINT Methodologies. International Journal of Information Security and Cybercrime, XIV: 32-38. https://www.ijisc.com Citation Format :
DAMIAN, D.M. (2025). Leveraging Behavioral Analysis and Machine Learning for Effective Ransomware Mitigation. International Journal of Information Security and Cybercrime, XIV(2), 39-44. Retrieve from https://www.ijisc.comDAMIAN, D.M., 2025. Leveraging Behavioral Analysis and Machine Learning for Effective Ransomware Mitigation. International Journal of Information Security and Cybercrime XIV(2), 39-44. Available from: https://www.ijisc.comD.M. DAMIAN, "Leveraging Behavioral Analysis and Machine Learning for Effective Ransomware Mitigation," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 39-44, 2025. Available: https://www.ijisc.comDAMIAN, D.M., 'Leveraging Behavioral Analysis and Machine Learning for Effective Ransomware Mitigation', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 39-44, (2025).DAMIAN, D.M.: Leveraging Behavioral Analysis and Machine Learning for Effective Ransomware Mitigation. International Journal of Information Security and Cybercrime XIV (2025) 39-44. https://www.ijisc.comDAMIAN, D.M., (2025), Leveraging Behavioral Analysis and Machine Learning for Effective Ransomware Mitigation. International Journal of Information Security and Cybercrime, XIV: 39-44. https://www.ijisc.com Citation Format :
COPACI, C.A.,COPACI, D.L., (2025). Analysis of Resource Exhaustion Attacks on IoT and Edge Computing Networks in Modern Infrastructures. International Journal of Information Security and Cybercrime, XIV(2), 45-50. Retrieve from https://www.ijisc.comCOPACI, C.A., COPACI, D.L., 2025. Analysis of Resource Exhaustion Attacks on IoT and Edge Computing Networks in Modern Infrastructures. International Journal of Information Security and Cybercrime XIV(2), 45-50. Available from: https://www.ijisc.comC.A. COPACI, D.L. COPACI, "Analysis of Resource Exhaustion Attacks on IoT and Edge Computing Networks in Modern Infrastructures," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 45-50, 2025. Available: https://www.ijisc.comCOPACI, C.A., COPACI, D.L., 'Analysis of Resource Exhaustion Attacks on IoT and Edge Computing Networks in Modern Infrastructures', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 45-50, (2025).COPACI, C.A.,COPACI, D.L.,: Analysis of Resource Exhaustion Attacks on IoT and Edge Computing Networks in Modern Infrastructures. International Journal of Information Security and Cybercrime XIV (2025) 45-50. https://www.ijisc.comCOPACI, C.A., COPACI, D.L., (2025), Analysis of Resource Exhaustion Attacks on IoT and Edge Computing Networks in Modern Infrastructures. International Journal of Information Security and Cybercrime, XIV: 45-50. https://www.ijisc.com Citation Format :
MAZILU, A.L. (2025). Embedded Systems Security. International Journal of Information Security and Cybercrime, XIV(2), 51-55. Retrieve from https://www.ijisc.comMAZILU, A.L., 2025. Embedded Systems Security. International Journal of Information Security and Cybercrime XIV(2), 51-55. Available from: https://www.ijisc.comA.L. MAZILU, "Embedded Systems Security," International Journal of Information Security and Cybercrime, vol. XIV, no. 2, pp. 51-55, 2025. Available: https://www.ijisc.comMAZILU, A.L., 'Embedded Systems Security', International Journal of Information Security and Cybercrime, vol. XIV, no. 2, 51-55, (2025).MAZILU, A.L.: Embedded Systems Security. International Journal of Information Security and Cybercrime XIV (2025) 51-55. https://www.ijisc.comMAZILU, A.L., (2025), Embedded Systems Security. International Journal of Information Security and Cybercrime, XIV: 51-55. https://www.ijisc.com Citation Format :