Cite Them Right 11th edition - Harvard

Zhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang und Zhiguo Wang (2024) „Binary Program Vulnerability Mining Based on Neural Network.“, Computers, Materials & Continua, 78(2), S. 1861-1879. doi:10.32604/cmc.2023.046595.

Chicago Manual of Style 17th edition (full note)

Zhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang, und Zhiguo Wang. „Binary Program Vulnerability Mining Based on Neural Network.“. Computers, Materials & Continua 78, Nr. 2 (1. Februar 2024): 1861-79. https://doi.org/10.32604/cmc.2023.046595.

American Psychological Association 7th edition

Zhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang, & Zhiguo Wang. (2024). Binary Program Vulnerability Mining Based on Neural Network. Computers, Materials & Continua, 78(2), 1861-1879. https://doi.org/10.32604/cmc.2023.046595

Modern Language Association 9th edition

Zhenhui Li, Shuangping Xing, Lin Yu, Huiping Li, Fan Zhou, Guangqiang Yin, Xikai Tang, und Zhiguo Wang. „Binary Program Vulnerability Mining Based on Neural Network.“. Computers, Materials & Continua, Bd. 78, Nr. 2, Februar 2024, S. 1861-79, https://doi.org/10.32604/cmc.2023.046595.

ISO-690 (author-date, Deutsch)

ZHENHUI LI, SHUANGPING XING, LIN YU, HUIPING LI, FAN ZHOU, GUANGQIANG YIN, XIKAI TANG und ZHIGUO WANG, 2024. Binary Program Vulnerability Mining Based on Neural Network. Computers, Materials & Continua. 1 Februar 2024. Bd. 78, Nr. 2, S. 1861-1879. DOI 10.32604/cmc.2023.046595

Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.