Cite
SoTE: Strategy of Triple-E on solving Trojan defense in cyber-crime cases
MLA
Kao, Da-Yu, et al. “SoTE: Strategy of Triple-E on Solving Trojan Defense in Cyber-Crime Cases.” Computer Law & Security Report, vol. 26, no. 1, Jan. 2010, p. 52. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsggo&AN=edsgcl.236020221&authtype=sso&custid=ns315887.
APA
Kao, D.-Y., Wang, S.-J., & Huang, F. F.-Y. (2010). SoTE: Strategy of Triple-E on solving Trojan defense in cyber-crime cases. Computer Law & Security Report, 26(1), 52.
Chicago
Kao, Da-Yu, Shiuh-Jeng Wang, and Frank Fu-Yuan Huang. 2010. “SoTE: Strategy of Triple-E on Solving Trojan Defense in Cyber-Crime Cases.” Computer Law & Security Report 26 (1): 52. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsggo&AN=edsgcl.236020221&authtype=sso&custid=ns315887.