APA (7th ed.) Citation

Wang, L., Cordy, J., & Dean, T. (2005). Enhancing security using legality assertions. 12th Working Conference on Reverse Engineering (WCRE'05), 10 pp.-44. https://doi.org/10.1109/WCRE.2005.36

Chicago Style (17th ed.) Citation

Wang, Lei, J.R Cordy, and T.R Dean. "Enhancing Security Using Legality Assertions." 12th Working Conference on Reverse Engineering (WCRE'05) 2005: 10 pp.-44. https://doi.org/10.1109/WCRE.2005.36.

MLA (9th ed.) Citation

Wang, Lei, et al. "Enhancing Security Using Legality Assertions." 12th Working Conference on Reverse Engineering (WCRE'05), 2005, pp. 10 pp.-44, https://doi.org/10.1109/WCRE.2005.36.

Warning: These citations may not always be 100% accurate.