Boldt, M., Carlsson, B., & Archives, T. P. S. U. C. (2006). Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html. http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf.
Citace podle Chicago (17th ed.)Boldt, Martin, Bengt Carlsson, a The Pennsylvania State University CiteSeerX Archives. "Analysing Privacy-invasive Software Using Computer Forensic Methods. Http: // Www. E-evidence. Info/ B. Html." Http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf 2006.
Citace podle MLA (9th ed.)Boldt, Martin, et al. "Analysing Privacy-invasive Software Using Computer Forensic Methods. Http: // Www. E-evidence. Info/ B. Html." Http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf, 2006.