Wang, L., Cordy, J., & Dean, T. (2005). Enhancing security using legality assertions. 12th Working Conference on Reverse Engineering (WCRE'05), 10 pp.-44. https://doi.org/10.1109/WCRE.2005.36
Chicago-Zitierstil (17. Ausg.)Wang, Lei, J.R Cordy, und T.R Dean. "Enhancing Security Using Legality Assertions." 12th Working Conference on Reverse Engineering (WCRE'05) 2005: 10 pp.-44. https://doi.org/10.1109/WCRE.2005.36.
MLA-Zitierstil (9. Ausg.)Wang, Lei, et al. "Enhancing Security Using Legality Assertions." 12th Working Conference on Reverse Engineering (WCRE'05), 2005, pp. 10 pp.-44, https://doi.org/10.1109/WCRE.2005.36.
Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.