Feng, X., Li, Q., Sun, K., Xu, K. und Wu, J. (2025) „Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.“, Communications of the ACM, 68(3), S. 48-59. doi:10.1145/3689819.
Chicago Manual of Style 17th edition (full note)Feng, Xuewei, Qi Li, Kun Sun, Ke Xu, und Jianping Wu. „Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.“. Communications of the ACM 68, Nr. 3 (1. März 2025): 48-59. https://doi.org/10.1145/3689819.
American Psychological Association 7th editionFeng, X., Li, Q., Sun, K., Xu, K., & Wu, J. (2025). Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. Communications of the ACM, 68(3), 48-59. https://doi.org/10.1145/3689819
Modern Language Association 9th editionFeng, X., Q. Li, K. Sun, K. Xu, und J. Wu. „Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite.“. Communications of the ACM, Bd. 68, Nr. 3, März 2025, S. 48-59, https://doi.org/10.1145/3689819.
ISO-690 (author-date, Deutsch)FENG, Xuewei, Qi LI, Kun SUN, Ke XU und Jianping WU, 2025. Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. Communications of the ACM. 1 März 2025. Bd. 68, Nr. 3, S. 48-59. DOI 10.1145/3689819