McCully, G. A., Hastings, J. D., Xu, S., & Fortier, A. (2025, April 24). Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code. Proceedings (International Symposium on Digital Forensic and Security. Online), 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025
Chicago-Zitierstil (17. Ausg.)McCully, Gary A., John D. Hastings, Shengjie Xu, und Adam Fortier. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online) 24 Apr. 2025: 1-6. https://doi.org/10.1109/ISDFS65363.2025.11012025.
MLA-Zitierstil (9. Ausg.)McCully, Gary A., et al. "Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code." Proceedings (International Symposium on Digital Forensic and Security. Online), 24 Apr. 2025, pp. 1-6, https://doi.org/10.1109/ISDFS65363.2025.11012025.