Cite
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
MLA
Wen, Shameng, et al. “Protocol Vulnerability Detection Based on Network Traffic Analysis and Binary Reverse Engineering.” PLoS ONE, vol. 12, no. 10, Oct. 2017, pp. 1–14. EBSCOhost, https://doi.org/10.1371/journal.pone.0186188.
APA
Wen, S., Meng, Q., Feng, C., & Tang, C. (2017). Protocol vulnerability detection based on network traffic analysis and binary reverse engineering. PLoS ONE, 12(10), 1–14. https://doi.org/10.1371/journal.pone.0186188
Chicago
Wen, Shameng, Qingkun Meng, Chao Feng, and Chaojing Tang. 2017. “Protocol Vulnerability Detection Based on Network Traffic Analysis and Binary Reverse Engineering.” PLoS ONE 12 (10): 1–14. doi:10.1371/journal.pone.0186188.