Cite
An ontology-based approach for helping to secure the ETSI machine-to-machine architecture
MLA
Gyrard, Amélie, et al. An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture. Sept. 2014. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.od......1093..1cf566196753c9261354d81665391fdb&authtype=sso&custid=ns315887.
APA
Gyrard, A., Bonnet, C., & Boudaoud, K. (2014). An ontology-based approach for helping to secure the ETSI machine-to-machine architecture.
Chicago
Gyrard, Amélie, Christian Bonnet, and Karima Boudaoud. 2014. “An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture,” September. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.od......1093..1cf566196753c9261354d81665391fdb&authtype=sso&custid=ns315887.