ISO-690 (author-date, English)

MENG YU, PENG LIU und WANYU ZANG, 2005. Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security. 1 August 2005. Vol. 13, no. 4, p. 623-658. DOI 10.3233/JCS-2005-13402.

Elsevier - Harvard (with titles)

Meng Yu, Peng Liu, Wanyu Zang, 2005. Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security 13, 623-658. https://doi.org/10.3233/JCS-2005-13402

American Psychological Association 7th edition

Meng Yu, Peng Liu, & Wanyu Zang. (2005). Specifying and using intrusion masking models to process distributed operations. Journal of Computer Security, 13(4), 623-658. https://doi.org/10.3233/JCS-2005-13402

Springer - Basic (author-date)

Meng Yu, Peng Liu, Wanyu Zang (2005) Specifying and using intrusion masking models to process distributed operations.. Journal of Computer Security 13:623-658. https://doi.org/10.3233/JCS-2005-13402

Juristische Zitierweise (Stüber) (Deutsch)

Meng Yu/ Peng Liu/ Wanyu Zang, Specifying and using intrusion masking models to process distributed operations., Journal of Computer Security 2005, 623-658.

Bitte prüfen Sie die Zitate auf Korrektheit, bevor Sie diese in Ihre Arbeit einfügen.