IJISC – International Journal of Information Security and Cybercrime (2015)

IJISC – International Journal of Information Security and Cybercrime, Volume 4, Issue 1, Year 2015

IJISC – International Journal of Information Security and Cybercrime, Volume 4, Issue 1, Year 2015

Editorial: A Regional Strategy for Cybersecurity
BACIVAROV, Ioan

Strategies for Monitoring Websites Security against Cyber-Attacks
MIHAI, Ioan-Cosmin; GENOE, Ray; PRUNĂ, Ștefan

New Challenges for Cybersecurity and Possible Criminal Law
DOBRINOIU, Maxim

The Role of Strategic Partnerships in Maintaining Cyber Security through Cooperation
DOGARU, Olguţa

A New Algorithm Based on Trap Packet for Black Hole Attack Detection in MANET
SAIED, Jafarian; MEHDI, Sadeghzadeh

Cyber Security Strategies – an Overview
MARTIN, Ioana

Defense in Depth Principle to Ensure Information Security
BARBU, Ionuț-Daniel; PETRICĂ, Gabriel

A Survey of the Prominent Effects of Cybersquatting in India
PIYUSH, Charan

Artificial Intelligence Role in Cybersecurity Infrastructures
OANCEA, Cristian-Vlad

Report on Cyber Security Alerts Processed by CERT-RO in 2014
CERT-RO

Interview with Dr. Ray GENOE
MIHAI, Ioan-Cosmin

Interview with Mr. Teodor CIMPOIEȘU
MIHAI, Ioan-Cosmin

Strategies XXI: Strategic Changes in Security and International Relations Conference Review
MIHAI, Ioan-Cosmin

The Euro-Atlantic Security and the Security in the Cyberspace Conference Review
MIHAI, Ioan-Cosmin

Full issue: www.ijisc.com/year-2015-issue-1/

IJISC – International Journal of Information Security and Cybercrime, Volume 4, Issue 2, Year 2015

IJISC – International Journal of Information Security and Cybercrime, Volume 4, Issue 2, Year 2015

Importance of Operating Systems Type in Computer Forensics
ÇAKIR, Hüseyin; KILIÇ, Mehmet Serkan

Digital Forensics: Current Scenario and Future Challenges
LAKADE, Sonal

Ransomware – an Emerging Threat
PASCARIU, Cristian; BARBU, Ionuț-Daniel

The Challenges to Enforcement of Cybercrimes Laws and Policy
EFG, Ajayi

Identity Crime: Deliberating on Remedies for the Victim
HOLM, Eric

Cybercrime Prevention in Online Transaction Using Biometric Access Control
NWOYE, Chinedu J.

Infection Vectors – Risk Factors for Financial Transactions
ŞCHEAU, Mircea Constantin; ARSENE, Liviu; DINCĂ, Gerald

Cyber Laundering: Understanding the Trends and Typologies
RAZA, Muhammad Subtain

Interview with Ms. Daria CATALUI
MIHAI, Ioan-Cosmin

European Cooperation in Combating Cybercrime Conference
DENA, Alexandru

A Central European Public-Private Dialogue Platform
CHRZANOVSKI, Laurent

BlackHat USA 2015
BARBU, Ionuţ-Daniel

OWASP EEE Bucharest 2015
PASCARIU, Cristian

“Challenges and Strategies in Cybersecurity” Book Review
BACIVAROV, Ioan

Full issue: www.ijisc.com/year-2015-issue-2/

Actualizat: 6.9.2017, 15:26 | Afișat: 3.7.2015, 23:25