Citace podle APA (7th ed.)

Kim, J., Park, M., Kim, H., Cho, S., & Kang, P. (2019). Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms. Applied sciences, 9(19), 4018. https://doi.org/10.3390/app9194018

Citace podle Chicago (17th ed.)

Kim, Junhong, Minsik Park, Haedong Kim, Suhyoun Cho, a Pilsung Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. https://doi.org/10.3390/app9194018.

Citace podle MLA (9th ed.)

Kim, Junhong, et al. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences, vol. 9, no. 19, 2019, p. 4018, https://doi.org/10.3390/app9194018.

Upozornění: Tyto citace jsou generovány automaticky. Nemusí být zcela správně podle citačních pravidel..