APA (7th ed.) Citation

McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2025, April 24). Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. Proceedings (International Symposium on Digital Forensic and Security. Online), 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025

Chicago Style (17th ed.) Citation

McCully, Gary A., John D. Hastings, Shengjie Xu, and Adam Fortier. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online) 24 Apr. 2025: 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025.

MLA (9th ed.) Citation

McCully, Gary A., et al. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online), 24 Apr. 2025, pp. 1-6, https://doi.org/10.1109/ISDFS65363.2025.11012025.

Warning: These citations may not always be 100% accurate.