
Title |
|---|
![]() The Application of Transformer-Based Models for Predicting Consequences of Cyber AttacksAnnual International Computer Software and Applications Conference (COMPSAC), 2025 |
![]() From Past to Present: A Survey of Malicious URL Detection Techniques, Datasets and Code RepositoriesComputer Science Review (CSR), 2025 |