Cite
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
MLA
Dunnett, Kealan, et al. A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework Using Blockchain. 2022. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2208.12031&authtype=sso&custid=ns315887.
APA
Dunnett, K., Pal, S., Putra, G. D., Jadidi, Z., & Jurdak, R. (2022). A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain.
Chicago
Dunnett, Kealan, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, and Raja Jurdak. 2022. “A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework Using Blockchain.” http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsarx&AN=edsarx.2208.12031&authtype=sso&custid=ns315887.