Chen, T., Li, L., Shan, B., Liang, G., Li, D., Wang, Q. und Xie, T. (2025) „Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries.“, ACM Transactions on Software Engineering & Methodology, 34(4), S. 1-27. doi:10.1145/3717060.
Chicago Manual of Style 17th edition (full note)Chen, Tianyu, Lin Li, Bingjie Shan, Guangtai Liang, Ding Li, Qianxiang Wang, und Tao Xie. „Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries.“. ACM Transactions on Software Engineering & Methodology 34, Nr. 4 (1. Mai 2025): 1-27. https://doi.org/10.1145/3717060.
American Psychological Association 7th editionChen, T., Li, L., Shan, B., Liang, G., Li, D., Wang, Q., & Xie, T. (2025). Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries. ACM Transactions on Software Engineering & Methodology, 34(4), 1-27. https://doi.org/10.1145/3717060
Modern Language Association 9th editionChen, T., L. Li, B. Shan, G. Liang, D. Li, Q. Wang, und T. Xie. „Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries.“. ACM Transactions on Software Engineering & Methodology, Bd. 34, Nr. 4, Mai 2025, S. 1-27, https://doi.org/10.1145/3717060.
ISO-690 (author-date, Deutsch)CHEN, Tianyu, Lin LI, Bingjie SHAN, Guangtai LIANG, Ding LI, Qianxiang WANG und Tao XIE, 2025. Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries. ACM Transactions on Software Engineering & Methodology. 1 Mai 2025. Bd. 34, Nr. 4, S. 1-27. DOI 10.1145/3717060