Zhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang und Zhiguo Wang (2024) „Binary Program Vulnerability Mining Based on Neural Network.“, Computers, Materials & Continua, 78(2), S. 1861-1879. doi:10.32604/cmc.2023.046595.
Chicago Manual of Style 17th edition (full note)Zhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang, und Zhiguo Wang. „Binary Program Vulnerability Mining Based on Neural Network.“. Computers, Materials & Continua 78, Nr. 2 (1. Februar 2024): 1861-79. https://doi.org/10.32604/cmc.2023.046595.
American Psychological Association 7th editionZhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang, & Zhiguo Wang. (2024). Binary Program Vulnerability Mining Based on Neural Network. Computers, Materials & Continua, 78(2), 1861-1879. https://doi.org/10.32604/cmc.2023.046595
Modern Language Association 9th editionZhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang, und Zhiguo Wang. „Binary Program Vulnerability Mining Based on Neural Network.“. Computers, Materials & Continua, Bd. 78, Nr. 2, Februar 2024, S. 1861-79, https://doi.org/10.32604/cmc.2023.046595.
ISO-690 (author-date, Deutsch)ZHENHUI LI, SHUANGPING XING, LIN YU, HUIPING LI, FAN ZHOU, GUANGQIANG YIN, XIKAI TANG und ZHIGUO WANG, 2024. Binary Program Vulnerability Mining Based on Neural Network. Computers, Materials & Continua. 1 Februar 2024. Bd. 78, Nr. 2, S. 1861-1879. DOI 10.32604/cmc.2023.046595