McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2025, April 24). Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. Proceedings (International Symposium on Digital Forensic and Security. Online), 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025
Chicago Style (17th ed.) CitationMcCully, Gary A., John D. Hastings, Shengjie Xu, and Adam Fortier. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online) 24 Apr. 2025: 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025.
MLA (9th ed.) CitationMcCully, Gary A., et al. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online), 24 Apr. 2025, pp. 1-6, https://doi.org/10.1109/ISDFS65363.2025.11012025.