Cite
Analysis of the implementation method of network security in the logical security domain of edge power secondary integration equipment
MLA
Hong xu, et al. “Analysis of the Implementation Method of Network Security in the Logical Security Domain of Edge Power Secondary Integration Equipment.” 2022 2nd International Conference on Electronic Information Engineering and Computer Technology (EIECT), Oct. 2022. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.doi.dedup.....2ef4f8e2c6dd9a7321972d9cf8efe335&authtype=sso&custid=ns315887.
APA
Hong xu, Leichun Gu, Shuhan Liu, Zhi-wei Hua, & Xin Li. (2022). Analysis of the implementation method of network security in the logical security domain of edge power secondary integration equipment. 2022 2nd International Conference on Electronic Information Engineering and Computer Technology (EIECT).
Chicago
Hong xu, Leichun Gu, Shuhan Liu, Zhi-wei Hua, and Xin Li. 2022. “Analysis of the Implementation Method of Network Security in the Logical Security Domain of Edge Power Secondary Integration Equipment.” 2022 2nd International Conference on Electronic Information Engineering and Computer Technology (EIECT), October. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.doi.dedup.....2ef4f8e2c6dd9a7321972d9cf8efe335&authtype=sso&custid=ns315887.