Author:
Horimoto Suguru,Lucas Keane,Bauer Lujo
Publisher
Springer Nature Switzerland
Reference29 articles.
1. Vx Underground. https://www.vx-underground.org/. Accessed 12 Dec 2023
2. Ahmad, I., Luo, L.: Unsupervised binary code translation with application to code clone detection and vulnerability discovery. In: Findings of the Association for Computational Linguistics: EMNLP 2023, pp. 14581–14592 (2023)
3. AV-TEST: SECURITY REPORT 2019/2020. https://www.av-test.org/fileadmin/pdf/security_report/AV-TEST_Security_Report_2019-2020.pdf. Accessed 10 Nov 2023
4. Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135–146 (2017)
5. Cybersecurity and Infrastructure Security Agency: Understanding Ransomware Threat Actors: LockBit. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a/. Accessed 09 Nov 2023