Cite
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
MLA
Wen, Shameng, et al. “A Model-Guided Symbolic Execution Approach for Network Protocol Implementations and Vulnerability Detection.” PLoS ONE, vol. 12, no. 11, Nov. 2017, pp. 1–13. EBSCOhost, https://doi.org/10.1371/journal.pone.0188229.
APA
Wen, S., Meng, Q., Feng, C., & Tang, C. (2017). A model-guided symbolic execution approach for network protocol implementations and vulnerability detection. PLoS ONE, 12(11), 1–13. https://doi.org/10.1371/journal.pone.0188229
Chicago
Wen, Shameng, Qingkun Meng, Chao Feng, and Chaojing Tang. 2017. “A Model-Guided Symbolic Execution Approach for Network Protocol Implementations and Vulnerability Detection.” PLoS ONE 12 (11): 1–13. doi:10.1371/journal.pone.0188229.