Cite
A formal model of Checked C1.
MLA
Li, Liyi, et al. “A Formal Model of Checked C1.” Journal of Computer Security, vol. 31, no. 5, Sept. 2023, pp. 581–614. EBSCOhost, https://doi.org/10.3233/JCS-230040.
APA
Li, L., Liu, Y., Postol, D., Lampropoulos, L., Van Horn, D., & Hicks, M. (2023). A formal model of Checked C1. Journal of Computer Security, 31(5), 581–614. https://doi.org/10.3233/JCS-230040
Chicago
Li, Liyi, Yiyun Liu, Deena Postol, Leonidas Lampropoulos, David Van Horn, and Michael Hicks. 2023. “A Formal Model of Checked C1.” Journal of Computer Security 31 (5): 581–614. doi:10.3233/JCS-230040.