Cite
Information Security Decisions with Consideration of Hacker Intrusion Propagation
MLA
Liurong Zhao, et al. “Information Security Decisions with Consideration of Hacker Intrusion Propagation.” Mathematical Problems in Engineering, vol. 2022, Aug. 2022, pp. 1–11. EBSCOhost, widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.doi.dedup.....bf4faec8cfda839c1fd9fc1076f5f5d8&authtype=sso&custid=ns315887.
APA
Liurong Zhao, Xinyu Zhou, & Jiao Li. (2022). Information Security Decisions with Consideration of Hacker Intrusion Propagation. Mathematical Problems in Engineering, 2022, 1–11.
Chicago
Liurong Zhao, Xinyu Zhou, and Jiao Li. 2022. “Information Security Decisions with Consideration of Hacker Intrusion Propagation.” Mathematical Problems in Engineering 2022 (August): 1–11. http://widgets.ebscohost.com/prod/customlink/proxify/proxify.php?count=1&encode=0&proxy=&find_1=&replace_1=&target=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsair&AN=edsair.doi.dedup.....bf4faec8cfda839c1fd9fc1076f5f5d8&authtype=sso&custid=ns315887.