CHENG, R., & LU, Y. Network security equipment evaluation based on attack tree with risk fusion. POSTS&TELECOM PRESS Co., LTD.
Chicago Style (17th ed.) CitationCHENG, Ran, and Yue-ming LU. Network Security Equipment Evaluation Based on Attack Tree with Risk Fusion. POSTS&TELECOM PRESS Co., LTD.
MLA (9th ed.) CitationCHENG, Ran, and Yue-ming LU. Network Security Equipment Evaluation Based on Attack Tree with Risk Fusion. POSTS&TELECOM PRESS Co., LTD.
Warning: These citations may not always be 100% accurate.