WANG, M., YING, L., & FENG, D. Exploit detection based on illegal control flow transfers identification. Editorial Department of Journal on Communications.
Chicago Style (17th ed.) CitationWANG, Ming-hua, Ling-yun YING, and Deng-guo FENG. Exploit Detection Based on Illegal Control Flow Transfers Identification. Editorial Department of Journal on Communications.
MLA (9th ed.) CitationWANG, Ming-hua, et al. Exploit Detection Based on Illegal Control Flow Transfers Identification. Editorial Department of Journal on Communications.
Warning: These citations may not always be 100% accurate.