ISO-690 (author-date, English)

SHAIKH MUKHTAR, Asfiya Shireen und JUGELE, R. N., 2025. Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection. In: . 1 August 2025.

Elsevier - Harvard (with titles)

Shaikh Mukhtar, A.S., Jugele, R.N., 2025. Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection, in: . https://doi.org/10.1109/ICETETSIP64213.2025.11156857

American Psychological Association 7th edition

Shaikh Mukhtar, A. S., & Jugele, R. N. (2025, August 1). Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection. https://doi.org/10.1109/ICETETSIP64213.2025.11156857

Springer - Basic (author-date)

Shaikh Mukhtar AS, Jugele RN (2025) Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection

Juristische Zitierweise (Stüber) (Deutsch)

Shaikh Mukhtar, Asfiya Shireen/ Jugele, R. N., Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection, 2025, .

Bitte prüfen Sie die Zitate auf Korrektheit, bevor Sie diese in Ihre Arbeit einfügen.