Editorial: A Regional Strategy for Cybersecurity BACIVAROV, Ioan Strategies for Monitoring Websites Security against Cyber-Attacks New Challenges for Cybersecurity and Possible Criminal Law The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET Cyber Security Strategies – an Overview Defense in Depth Principle to Ensure Information Security A Survey of the Prominent Effects of Cybersquatting in India Artificial Intelligence Role in Cybersecurity Infrastructures Report on Cyber Security Alerts Processed by CERT-RO in 2014 Interview with Dr. Ray GENOE Interview with Mr. Teodor CIMPOIEȘU Strategies XXI: Strategic Changes in Security and International Relations Conference Review The Euro-Atlantic Security and the Security in the Cyberspace Conference Review Full issue: www.ijisc.com/year-2015-issue-1/ |
|
Importance of Operating Systems Type in Computer Forensics ÇAKIR, Hüseyin; KILIÇ, Mehmet Serkan Digital Forensics: Current Scenario and Future Challenges Ransomware – an Emerging Threat The Challenges to Enforcement of Cybercrimes Laws and Policy Identity Crime: Deliberating on Remedies for the Victim Cybercrime Prevention in Online Transaction Using Biometric Access Control Infection Vectors – Risk Factors for Financial Transactions Cyber Laundering: Understanding the Trends and Typologies Interview with Ms. Daria CATALUI European Cooperation in Combating Cybercrime Conference A Central European Public-Private Dialogue Platform BlackHat USA 2015 OWASP EEE Bucharest 2015 “Challenges and Strategies in Cybersecurity” Book Review Full issue: www.ijisc.com/year-2015-issue-2/ |
|
IJISC – International Journal of Information Security and Cybercrime (2015)
Actualizat: 6.9.2017, 15:26 | Afișat: 3.7.2015, 23:25