APA (7th ed.) Citation

Maher, Z. A., Shah, A., Shaikh, H., Rahu, G. A., Butt, P. K., Chandio, S., & Shaikh, S. (2018). A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases. IEEE Explore.

Chicago Style (17th ed.) Citation

Maher, Zulfikar Ahmad, Asadullah Shah, Humaiz Shaikh, Ghulam Ali Rahu, Pinial Khan Butt, Shahmurad Chandio, and Saima Shaikh. A Methodology for Modelling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases. IEEE Explore, 2018.

MLA (8th ed.) Citation

Maher, Zulfikar Ahmad, et al. A Methodology for Modelling and Analysis of Secure Systems Using Security Patterns and Mitigation Use Cases. IEEE Explore, 2018.

Warning: These citations may not always be 100% accurate.