APA (7th ed.) Citation

HU, Y., & PEI, Q. Mining and utilization of network protocol’s stealth attack behavior. Editorial Department of Journal on Communications.

Chicago Style (17th ed.) Citation

HU, Yan-jing, and Qing-qi PEI. Mining and Utilization of Network Protocol’s Stealth Attack Behavior. Editorial Department of Journal on Communications.

MLA (9th ed.) Citation

HU, Yan-jing, and Qing-qi PEI. Mining and Utilization of Network Protocol’s Stealth Attack Behavior. Editorial Department of Journal on Communications.

Warning: These citations may not always be 100% accurate.