APA (7th ed.) Citation

Zhi-yong1, L., 2, Chao1, F., & Hui2, Y. Evaluating the network security by the Read<sub>W</sub>rite transition model. Editorial Department of Journal on Communications.

Chicago Style (17th ed.) Citation

Zhi-yong1, LU, 2, FENG Chao1, and YU Hui2. Evaluating the Network Security by the Read<sub>W</sub>rite Transition Model. Editorial Department of Journal on Communications.

MLA (9th ed.) Citation

Zhi-yong1, LU, et al. Evaluating the Network Security by the Read<sub>W</sub>rite Transition Model. Editorial Department of Journal on Communications.

Warning: These citations may not always be 100% accurate.