APA-Zitierstil (7. Ausg.)

Buhren, R., Vetter, J., & Nordholz, J. (2016). The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings, 376. https://doi.org/10.1007/978-3-319-50011-9_29

Chicago-Zitierstil (17. Ausg.)

Buhren, Robert, Julian Vetter, und Jan Nordholz. "The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture." Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings 2016: 376. https://doi.org/10.1007/978-3-319-50011-9_29.

MLA-Zitierstil (9. Ausg.)

Buhren, Robert, et al. "The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture." Information & Communications Security: 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings, 2016, p. 376, https://doi.org/10.1007/978-3-319-50011-9_29.

Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.