Found: 13
Select item for more details and to access through your institution.
Interview with Dr. Maxim DOBRINOIU.
- Published in:
- 2016
- By:
- Publication type:
- Interview
Servers Configuration and Testing for Secure Exchange of Information over the Internet.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 87, doi. 10.19107/IJISC.2016.02.08
- By:
- Publication type:
- Article
The 15th International Conference on Quality and Dependability - CCF 2016.
- Published in:
- 2016
- By:
- Publication type:
- Proceeding
PPSUC International Policing Forum.
- Published in:
- 2016
- By:
- Publication type:
- Proceeding
Malicious Web Pages Detection Using Static Analysis of URLs.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 57, doi. 10.19107/IJISC.2016.02.06
- By:
- Publication type:
- Article
CERT-RO Conference: New Global Challenge in Cyber Security.
- Published in:
- 2016
- By:
- Publication type:
- Proceeding
DefCamp #7 - International Hacking & Information Security Conference.
- Published in:
- 2016
- By:
- Publication type:
- Proceeding
A Fingerprint-Based Scheme for ATM User Authentication.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 71, doi. 10.19107/IJISC.2016.02.07
- By:
- Publication type:
- Article
Cyber Espionage Incrimination in Romanian Legislation.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 51, doi. 10.19107/IJISC.2016.02.05
- By:
- Publication type:
- Article
The Impact of Cybercrimes on Global Trade and Commerce.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 31, doi. 10.19107/IJISC.2016.02.04
- By:
- Publication type:
- Article
Romanian Legislation on Cybercrime.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 25, doi. 10.19107/IJISC.2016.02.03
- By:
- Publication type:
- Article
Information Security Aspects of Business Continuity Management.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 17, doi. 10.19107/IJISC.2016.02.02
- By:
- Publication type:
- Article
Security Challenges for Software Development Companies.
- Published in:
- International Journal of Information Security & Cybercrime, 2016, v. 5, n. 2, p. 9, doi. 10.19107/IJISC.2016.02.01
- By:
- Publication type:
- Article