Citace podle APA (7th ed.)

Yang, S., Chen, J., Huang, M., Zheng, Z., & Huang, Y. (2024, April 14). Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. Proceedings / International Conference on Software Engineering, 1573-1584. https://doi.org/10.1145/3597503.3639153

Citace podle Chicago (17th ed.)

Yang, Shuo, Jiachi Chen, Mingyuan Huang, Zibin Zheng, a Yuan Huang. "Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts." Proceedings / International Conference on Software Engineering 14 Apr. 2024: 1573-1584. https://doi.org/10.1145/3597503.3639153.

Citace podle MLA (9th ed.)

Yang, Shuo, et al. "Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts." Proceedings / International Conference on Software Engineering, 14 Apr. 2024, pp. 1573-1584, https://doi.org/10.1145/3597503.3639153.

Upozornění: Tyto citace jsou generovány automaticky. Nemusí být zcela správně podle citačních pravidel..