Jia-quan1, S., Bing2, Z., Da-peng1, M., & Wu1, Y. (2009, January). Approach to making strategies for network security enhancement based on attack graphs. Tongxin xuebao.
Chicago Style (17th ed.) CitationJia-quan1, SI, ZHANG Bing2, MAN Da-peng1, and YANG Wu1. "Approach to Making Strategies for Network Security Enhancement Based on Attack Graphs." Tongxin Xuebao Jan. 2009.
MLA (9th ed.) CitationJia-quan1, SI, et al. "Approach to Making Strategies for Network Security Enhancement Based on Attack Graphs." Tongxin Xuebao, Jan. 2009.
Warning: These citations may not always be 100% accurate.
