MENG YU, PENG LIU und WANYU ZANG, 2005. Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security. 1 August 2005. Vol. 13, no. 4, p. 623-658. DOI 10.3233/JCS-2005-13402.
Elsevier - Harvard (with titles)Meng Yu, Peng Liu, Wanyu Zang, 2005. Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security 13, 623-658. https://doi.org/10.3233/JCS-2005-13402
American Psychological Association 7th editionMeng Yu, Peng Liu, & Wanyu Zang. (2005). Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security, 13(4), 623-658. https://doi.org/10.3233/JCS-2005-13402
Springer - Basic (author-date)Meng Yu, Peng Liu, Wanyu Zang (2005) Specifying and using intrusion masking models to process distributed operations.. Journal of Computer Security 13:623-658. https://doi.org/10.3233/JCS-2005-13402
Juristische Zitierweise (Stüber) (Deutsch)Meng Yu/ Peng Liu/ Wanyu Zang, Specifying and using intrusion masking models to process distributed operations., Journal of Computer Security 2005, 623-658.