APA (7th ed.) Citation

Barik, M. S., Mazumdar, C., & Gupta, A. (2016). Network Vulnerability Analysis Using a Constrained Graph Data Model. Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, 263. https://doi.org/10.1007/978-3-319-49806-5_14

Chicago Style (17th ed.) Citation

Barik, Mridul Sankar, Chandan Mazumdar, and Amarnath Gupta. "Network Vulnerability Analysis Using a Constrained Graph Data Model." Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings 2016: 263. https://doi.org/10.1007/978-3-319-49806-5_14.

MLA (9th ed.) Citation

Barik, Mridul Sankar, et al. "Network Vulnerability Analysis Using a Constrained Graph Data Model." Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, 2016, p. 263, https://doi.org/10.1007/978-3-319-49806-5_14.

Warning: These citations may not always be 100% accurate.