Zhi-yong1, L., 2, Chao1, F., & Hui2, Y. Evaluating the network security by the Read<sub>W</sub>rite transition model. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) CitationZhi-yong1, LU, 2, FENG Chao1, and YU Hui2. Evaluating the Network Security by the Read<sub>W</sub>rite Transition Model. Editorial Department of Journal on Communications.
MLA (9th ed.) CitationZhi-yong1, LU, et al. Evaluating the Network Security by the Read<sub>W</sub>rite Transition Model. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.