APA (7th ed.) Citation

Kim, J., Park, M., Kim, H., Cho, S., & Kang, P. (2019). Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms. Applied sciences, 9(19), 4018. https://doi.org/10.3390/app9194018

Chicago Style (17th ed.) Citation

Kim, Junhong, Minsik Park, Haedong Kim, Suhyoun Cho, and Pilsung Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. https://doi.org/10.3390/app9194018.

MLA (9th ed.) Citation

Kim, Junhong, et al. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences, vol. 9, no. 19, 2019, p. 4018, https://doi.org/10.3390/app9194018.

Warning: These citations may not always be 100% accurate.