APA (7th ed.) Citation

Sarker, A., Mondal, J. P., Seraj, M., & Noor, J. (2024, December 20). Optimizing endpoint detection and monitoring in enterprise solution: A cyber threat intelligence approach. Computer and information technology, 2683-2688. https://doi.org/10.1109/ICCIT64611.2024.11021895

Chicago Style (17th ed.) Citation

Sarker, Apurba, Joty Prokash Mondal, Mehnaz Seraj, and Jannatun Noor. "Optimizing Endpoint Detection and Monitoring in Enterprise Solution: A Cyber Threat Intelligence Approach." Computer and Information Technology 20 Dec. 2024: 2683-2688. https://doi.org/10.1109/ICCIT64611.2024.11021895.

MLA (9th ed.) Citation

Sarker, Apurba, et al. "Optimizing Endpoint Detection and Monitoring in Enterprise Solution: A Cyber Threat Intelligence Approach." Computer and Information Technology, 20 Dec. 2024, pp. 2683-2688, https://doi.org/10.1109/ICCIT64611.2024.11021895.

Warning: These citations may not always be 100% accurate.