APA (7th ed.) Citation

Huang, J., Chen, J., Wang, M., & Hu, Y. (2025). FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches. IEEE internet of things journal, 1. https://doi.org/10.1109/JIOT.2025.3631834

Chicago Style (17th ed.) Citation

Huang, Jing, Jiongyi Chen, Min Wang, and Yupeng Hu. "FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches." IEEE Internet of Things Journal 2025: 1. https://doi.org/10.1109/JIOT.2025.3631834.

MLA (9th ed.) Citation

Huang, Jing, et al. "FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches." IEEE Internet of Things Journal, 2025, p. 1, https://doi.org/10.1109/JIOT.2025.3631834.

Warning: These citations may not always be 100% accurate.