Cite Them Right 11th edition - Harvard

Feng, X., Li, Q., Sun, K., Xu, K. und Wu, J. (2025) „Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.“, Communications of the ACM, 68(3), S. 48-59. doi:10.1145/3689819.

Chicago Manual of Style 17th edition (full note)

Feng, Xuewei, Qi Li, Kun Sun, Ke Xu, und Jianping Wu. „Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.“. Communications of the ACM 68, Nr. 3 (1. März 2025): 48-59. https://doi.org/10.1145/3689819.

American Psychological Association 7th edition

Feng, X., Li, Q., Sun, K., Xu, K., & Wu, J. (2025). Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. Communications of the ACM, 68(3), 48-59. https://doi.org/10.1145/3689819

Modern Language Association 9th edition

Feng, X., Q. Li, K. Sun, K. Xu, und J. Wu. „Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.“. Communications of the ACM, Bd. 68, Nr. 3, März 2025, S. 48-59, https://doi.org/10.1145/3689819.

ISO-690 (author-date, Deutsch)

FENG, Xuewei, Qi LI, Kun SUN, Ke XU und Jianping WU, 2025. Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. Communications of the ACM. 1 März 2025. Bd. 68, Nr. 3, S. 48-59. DOI 10.1145/3689819

Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.