Wu, B., Nazir, S., & Mukhtar, N. Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication. Wiley.
Chicago Style (17th ed.) CitationWu, Banghua, Shah Nazir, and Neelam Mukhtar. Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication. Wiley.
MLA (9th ed.) CitationWu, Banghua, et al. Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication. Wiley.
Warning: These citations may not always be 100% accurate.