APA (7th ed.) Citation

Shen, Q., Meng, G., & Chen, K. (2024, July). Revealing the exploitability of heap overflow through PoC analysis. Cybersecurity.

Chicago Style (17th ed.) Citation

Shen, Qintao, Guozhu Meng, and Kai Chen. "Revealing the Exploitability of Heap Overflow Through PoC Analysis." Cybersecurity Jul. 2024.

MLA (9th ed.) Citation

Shen, Qintao, et al. "Revealing the Exploitability of Heap Overflow Through PoC Analysis." Cybersecurity, Jul. 2024.

Warning: These citations may not always be 100% accurate.