McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2025, April 24). Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. Proceedings (International Symposium on Digital Forensic and Security. Online), 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025
Citace podle Chicago (17th ed.)McCully, Gary A., John D. Hastings, Shengjie Xu, a Adam Fortier. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online) 24 Apr. 2025: 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025.
Citace podle MLA (9th ed.)McCully, Gary A., et al. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online), 24 Apr. 2025, pp. 1-6, https://doi.org/10.1109/ISDFS65363.2025.11012025.