Wang, L., Cordy, J., & Dean, T. (2005). Enhancing security using legality assertions. 12th Working Conference on Reverse Engineering (WCRE'05), 10 pp.-44. https://doi.org/10.1109/WCRE.2005.36
Chicago Style (17th ed.) CitationWang, Lei, J.R Cordy, and T.R Dean. "Enhancing Security Using Legality Assertions." 12th Working Conference on Reverse Engineering (WCRE'05) 2005: 10 pp.-44. https://doi.org/10.1109/WCRE.2005.36.
MLA (9th ed.) CitationWang, Lei, et al. "Enhancing Security Using Legality Assertions." 12th Working Conference on Reverse Engineering (WCRE'05), 2005, pp. 10 pp.-44, https://doi.org/10.1109/WCRE.2005.36.
Warning: These citations may not always be 100% accurate.