SHAIKH MUKHTAR, Asfiya Shireen und JUGELE, R. N., 2025. Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection. In: . 1 August 2025.
Elsevier - Harvard (with titles)Shaikh Mukhtar, A.S., Jugele, R.N., 2025. Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection, in: . https://doi.org/10.1109/ICETETSIP64213.2025.11156857
American Psychological Association 7th editionShaikh Mukhtar, A. S., & Jugele, R. N. (2025, August 1). Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection. https://doi.org/10.1109/ICETETSIP64213.2025.11156857
Springer - Basic (author-date)Shaikh Mukhtar AS, Jugele RN (2025) Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection
Juristische Zitierweise (Stüber) (Deutsch)Shaikh Mukhtar, Asfiya Shireen/ Jugele, R. N., Optimizing Network Security: A CRNN Architecture for Firewall Anomaly Detection, 2025, .