{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:54:18Z","timestamp":1774929258758,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172042"],"award-info":[{"award-number":["62172042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07545-8","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T09:37:04Z","timestamp":1750325824000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Malgta: large language model-based guided malware tactical analysis"],"prefix":"10.1007","volume":"81","author":[{"given":"Wenjie","family":"Guo","sequence":"first","affiliation":[]},{"given":"Jingfeng","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Zeyang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jingjing","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"issue":"5","key":"7545_CR1","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TETCI.2019.2923426","volume":"4","author":"R Wang","year":"2020","unstructured":"Wang R, Ji W (2020) Computational intelligence for information security: A survey. IEEE Trans Emerg Top Comput Intell 4(5):616\u2013629","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"7545_CR2","unstructured":"AvTest (2024) Malware Statistics https:\/\/www.av-test.org\/en\/statistics\/malware\/ Accessed 2024-12-09"},{"key":"7545_CR3","doi-asserted-by":"publisher","unstructured":"Dambra S, Han Y, Aonzo S, Kotzias P, Vitale A, Caballero J, Balzarotti D, Bilge L (2023) Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive Into Datasets, Feature Extraction, and Model Performance. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201923, pp. 60\u201374. Association for Computing Machinery, New York, NY, USA https:\/\/doi.org\/10.1145\/3576915.3616589","DOI":"10.1145\/3576915.3616589"},{"key":"7545_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100529","volume":"47","author":"M Gopinath","year":"2023","unstructured":"Gopinath M, Sethuraman SC (2023) A comprehensive survey on deep learning based malware detection techniques. Comput Sci Rev 47:100529","journal-title":"Comput Sci Rev"},{"key":"7545_CR5","doi-asserted-by":"publisher","first-page":"4128","DOI":"10.1109\/TIFS.2023.3283913","volume":"18","author":"YH Chen","year":"2023","unstructured":"Chen YH, Lin SC, Huang SC, Lei CL, Huang CY (2023) Guided malware sample analysis based on graph neural networks. IEEE Trans Inf Forensics Secur 18:4128\u20134143. https:\/\/doi.org\/10.1109\/TIFS.2023.3283913","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7545_CR6","unstructured":"Downing E, Mirsky Y, Park K, Lee W (2021) DeepReflect: Discovering Malicious Functionality Through Binary Reconstruction. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3469\u20133486. USENIX Association, Vancouver, B.C., Canada https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/downing"},{"key":"7545_CR7","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1109\/TIFS.2023.3330337","volume":"19","author":"G-W Wong","year":"2024","unstructured":"Wong G-W, Huang Y-T, Guo Y-R, Sun Y, Chen MC (2024) Attention-based api locating for malware techniques. IEEE Trans Inf Forensics Secur 19:1199\u20131212. https:\/\/doi.org\/10.1109\/TIFS.2023.3330337","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7545_CR8","unstructured":"OpenAI (2023) GPT-4 technical report. CoRR arxiv: 2303.08774"},{"key":"7545_CR9","unstructured":"Hassanin M, Moustafa N (2024) A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions. arXiv. arXiv:2405.14487 [cs] Accessed 2024-07-23"},{"key":"7545_CR10","unstructured":"Zhang Y, Zhou X, Wen H, Niu W, Liu J, Wang H, Li Q (2024) Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. arXiv. arXiv:2407.08532 [cs] Accessed 2024-07-23"},{"key":"7545_CR11","unstructured":"Divakaran DM, Peddinti ST (2024) LLMs for Cyber Security: New Opportunities. arXiv. arXiv:2404.11338 [cs] Accessed 2024-07-23"},{"key":"7545_CR12","unstructured":"Zhang J, Bu H, Wen H, Chen Y, Li L, Zhu H (2024) When LLMs Meet Cybersecurity: A Systematic Literature Review. arXiv. arXiv:2405.03644 [cs] Accessed 2024-07-23"},{"key":"7545_CR13","unstructured":"Rong H, Duan Y, Zhang H, Wang X, Chen H, Duan S, Wang S (2024) Disassembling Obfuscated Executables with LLM. arXiv arxiv: 2407.08924 Accessed 2024-07-23"},{"key":"7545_CR14","unstructured":"Schwartz Y, Benshimol L, Mimran D, Elovici Y, Shabtai A (2024) LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI. arXiv arxiv: 2407.05194 Accessed 2024-07-23"},{"key":"7545_CR15","unstructured":"Guarnieri C, Contributors CS (2011) Cuckoo Sandbox: Open Source Automated Malware Analysis https:\/\/cuckoosandbox.org Accessed 2024-08-17"},{"key":"7545_CR16","first-page":"9459","volume":"33","author":"P Lewis","year":"2020","unstructured":"Lewis P, Perez E, Piktus A, Petroni F, Karpukhin V, Goyal N, K\u00fcttler H, Lewis M, Yih W-t, Rockt\u00e4schel T et al (2020) Retrieval-augmented generation for knowledge-intensive nlp tasks. Adv Neural Inf Process Syst 33:9459\u20139474","journal-title":"Adv Neural Inf Process Syst"},{"key":"7545_CR17","unstructured":"VirusShare (2024) APT Malware Sample Dataset. Public Data Source https:\/\/virusshare.com\/ Accessed 2024-08-27"},{"key":"7545_CR18","unstructured":"China Information Security Certification Center (2024) APT Malware Sample Dataset https:\/\/www.cncert.org.cn\/ Accessed 2024-08-27"},{"key":"7545_CR19","unstructured":"Analysis H (2023) Hybrid Analysis: Advanced Malware Analysis Platform. Accessed: 2025-01-21 https:\/\/www.hybrid-analysis.com\/"},{"key":"7545_CR20","unstructured":"Koide T, Fukushi N, Nakano H, Chiba D (2024) Detecting Phishing Sites Using ChatGPT. arXiv. arXiv:2306.05816 [cs] Accessed 2024-06-14"},{"key":"7545_CR21","doi-asserted-by":"publisher","unstructured":"Sun Y, Wu D, Xue Y, Liu H, Wang H, Xu Z, Xie X, Liu Y (2024) GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, pp. 1\u201313. ACM, Lisbon Portugal https:\/\/doi.org\/10.1145\/3597503.3639117","DOI":"10.1145\/3597503.3639117"},{"issue":"3","key":"7545_CR22","doi-asserted-by":"publisher","first-page":"345","DOI":"10.3390\/software3030018","volume":"3","author":"X Ren","year":"2024","unstructured":"Ren X, Wei Q (2024) Sligpt: A large language model-based approach for data dependency analysis on solidity smart contracts. Software 3(3):345\u2013367. https:\/\/doi.org\/10.3390\/software3030018","journal-title":"Software"},{"key":"7545_CR23","unstructured":"Yan P, Tan S, Wang M, Huang J (2023) Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4. arXiv arxiv: 2312.08317 Accessed 2024-07-04"},{"key":"7545_CR24","doi-asserted-by":"crossref","unstructured":"Robertson S, Zaragoza H et al (2009) The probabilistic relevance framework: Bm25 and beyond. Found Trends\u00ae Inf Retrieval 3(4) 333\u2013389","DOI":"10.1561\/1500000019"},{"issue":"3","key":"7545_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu HC, Luk RWP, Wong KF, Kwok KL (2008) Interpreting tf-idf term weights as making relevance decisions. ACM Trans Inf Syst (TOIS) 26(3):1\u201337","journal-title":"ACM Trans Inf Syst (TOIS)"},{"key":"7545_CR26","doi-asserted-by":"publisher","unstructured":"Jeong S, Baek J, Cho S, Hwang SJ, Park J (2024) Adaptive-RAG: Learning to adapt retrieval-augmented large language models through question complexity. In: Duh, K., Gomez, H., Bethard, S. (eds.) Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), pp. 7036\u20137050. Association for Computational Linguistics, Mexico City, Mexico https:\/\/doi.org\/10.18653\/v1\/2024.naacl-long.389","DOI":"10.18653\/v1\/2024.naacl-long.389"},{"key":"7545_CR27","doi-asserted-by":"publisher","unstructured":"Li W, Li J, Ma W, Liu Y (2024) Citation-enhanced generation for LLM-based chatbots. In: Ku, L.-W., Martins, A., Srikumar, V. (eds.) Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 1451\u20131466. Association for Computational Linguistics, Bangkok, Thailand https:\/\/doi.org\/10.18653\/v1\/2024.acl-long.79","DOI":"10.18653\/v1\/2024.acl-long.79"},{"key":"7545_CR28","doi-asserted-by":"publisher","unstructured":"Liu Y, Hashimoto K, Zhou Y, Yavuz S, Xiong C, Yu P (2021) Dense hierarchical retrieval for open-domain question answering. In: Moens, M.-F., Huang, X., Specia, L., Yih, S.W.-t. (eds.) Findings of the Association for Computational Linguistics: EMNLP 2021, pp. 188\u2013200. Association for Computational Linguistics, Punta Cana, Dominican Republic https:\/\/doi.org\/10.18653\/v1\/2021.findings-emnlp.19","DOI":"10.18653\/v1\/2021.findings-emnlp.19"},{"key":"7545_CR29","doi-asserted-by":"publisher","unstructured":"Chen T, Wang H, Chen S, Yu W, Ma K, Zhao X, Zhang H, Yu D (2024) Dense X retrieval: What retrieval granularity should we use? In: Al-Onaizan, Y., Bansal, M., Chen, Y.-N. (eds.) Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, pp. 15159\u201315177. Association for Computational Linguistics, Miami, Florida, USA https:\/\/doi.org\/10.18653\/v1\/2024.emnlp-main.845","DOI":"10.18653\/v1\/2024.emnlp-main.845"},{"key":"7545_CR30","doi-asserted-by":"publisher","unstructured":"Suvizi A, Subramaniam S, Lan T, Venkataramani G (2024) Exploring in-Memory Accelerators and fpgas for Latency-sensitive DNN Inference on Edge Servers. In: 2024 IEEE Cloud Summit, pp. 1\u20136 https:\/\/doi.org\/10.1109\/Cloud-Summit61220.2024.00007","DOI":"10.1109\/Cloud-Summit61220.2024.00007"},{"key":"7545_CR31","doi-asserted-by":"publisher","unstructured":"Miao Y, Gai K, Yu J, Tan Y, Zhu L, Meng W (2024) Blockchain-empowered keyword searchable provable data possession for large similar data. IEEE Trans Inf Forensics Security pp(99), 1\u20131 https:\/\/doi.org\/10.1109\/TIFS.2024.3516563","DOI":"10.1109\/TIFS.2024.3516563"},{"key":"7545_CR32","doi-asserted-by":"publisher","first-page":"2721","DOI":"10.1109\/TIFS.2025.3542246","volume":"20","author":"K Gai","year":"2025","unstructured":"Gai K, Wang Z, Yu J, Zhu L (2025) Mufti: Multi-domain distillation-based heterogeneous federated continuous learning. IEEE Trans Inf Forensics Security 20:2721\u20132733","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"4","key":"7545_CR33","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TDSC.2023.3298905","volume":"21","author":"C Liu","year":"2024","unstructured":"Liu C, Li B, Zhao J, Liu X, Li C (2024) Malaf: Malware attack foretelling from run-time behavior graph sequence. IEEE Trans Dependable Secure Comput 21(4):1951\u20131966. https:\/\/doi.org\/10.1109\/TDSC.2023.3298905","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7545_CR34","doi-asserted-by":"publisher","unstructured":"Feng P, Gai L, Yang L, Wang Q, Li T, Xi N, Ma J (2024) DawnGNN: Documentation augmented windows malware detection using graph neural network. Computers & Security 140:103788. https:\/\/doi.org\/10.1016\/j.cose.2024.103788. Accessed 2024-05-10","DOI":"10.1016\/j.cose.2024.103788."},{"key":"7545_CR35","doi-asserted-by":"publisher","unstructured":"Finder I, Sheetrit E, Nissim N (2022) Time-interval temporal patterns can beat and explain the malware. Knowledge-Based Systems 241:108266. https:\/\/doi.org\/10.1016\/j.knosys.2022.108266. Accessed 2022-10-15","DOI":"10.1016\/j.knosys.2022.108266."},{"issue":"5","key":"7545_CR36","doi-asserted-by":"publisher","first-page":"8440","DOI":"10.1109\/JIOT.2023.3322412","volume":"11","author":"D He","year":"2024","unstructured":"He D, Gu H, Zhu S, Chan S, Guizani M (2024) A comprehensive detection method for the lateral movement stage of apt attacks. IEEE Int Things J 11(5):8440\u20138447. https:\/\/doi.org\/10.1109\/JIOT.2023.3322412","journal-title":"IEEE Int Things J"},{"key":"7545_CR37","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/j.ins.2020.08.095","volume":"546","author":"W Han","year":"2021","unstructured":"Han W, Xue J, Wang Y, Zhang F, Gao X (2021) APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework. Inf Sci 546:633\u2013664. https:\/\/doi.org\/10.1016\/j.ins.2020.08.095","journal-title":"Inf Sci"},{"key":"7545_CR38","doi-asserted-by":"publisher","unstructured":"Chen T, Dong C, Lv M, Song Q, Liu H, Zhu T, Xu K, Chen L, Ji S, Fan Y (2022) Apt-kgl: An intelligent apt detection system based on threat knowledge and heterogeneous provenance graph learning. IEEE Trans Dependable Secure Comput PP(99), 1\u201315 https:\/\/doi.org\/10.1109\/TDSC.2022.3229472","DOI":"10.1109\/TDSC.2022.3229472"},{"key":"7545_CR39","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1109\/TIFS.2025.3530700","volume":"20","author":"S Wang","year":"2025","unstructured":"Wang S, Gai K, Yu J, Zhang Z, Zhu L (2025) Pravfed: Practical heterogeneous vertical federated learning via representation learning. IEEE Trans Inf Forensics Security 20:2693\u20132705","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"7545_CR40","doi-asserted-by":"publisher","unstructured":"Zhou C, Huang C, Wang Y, Zuo Z (2023) Aptbert: Abstract Generation and Event Extraction From apt Reports. In: Proceedings of the 14th EAI International Conference on Digital Forensics and Cyber Crime (ICDF2C), pp. 209\u2013223. Springer, New York City, NY, USA https:\/\/doi.org\/10.1007\/978-3-031-56583-0_14","DOI":"10.1007\/978-3-031-56583-0_14"},{"key":"7545_CR41","doi-asserted-by":"publisher","unstructured":"Shenderovitz G, Nissim N (2024) Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls. Computers & Security 142:103862. https:\/\/doi.org\/10.1016\/j.cose.2024.103862. Accessed 2024-06-17","DOI":"10.1016\/j.cose.2024.103862."},{"key":"7545_CR42","doi-asserted-by":"publisher","unstructured":"Wang Q, Yan H, Han Z (2021) Explainable APT Attribution for Malware Using NLP Techniques. In: 21st IEEE International Conference on Software Quality, Reliability and Security, QRS 2021, Hainan, China, December 6-10, 2021, pp. 70\u201380. IEEE, Hainan, China https:\/\/doi.org\/10.1109\/QRS54544.2021.00018","DOI":"10.1109\/QRS54544.2021.00018"},{"key":"7545_CR43","doi-asserted-by":"publisher","unstructured":"Suvizi A, Farghadan A, Saheb Zamani M A Parallel Computing Architecture Based on Cellular Automata for Hydraulic Analysis of Water Distribution Networks. https:\/\/doi.org\/10.1016\/j.jpdc.2023.03.009. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0743731523000527","DOI":"10.1016\/j.jpdc.2023.03.009"},{"key":"7545_CR44","doi-asserted-by":"publisher","first-page":"19898","DOI":"10.1109\/ACCESS.2025.3531338","volume":"13","author":"B Jahannia","year":"2025","unstructured":"Jahannia B, Amirany A, Heidari E, Dalir H (2025) Dalamed: A clock-frequency and data-lifetime-aware methodology for energy-efficient memory design in edge devices. IEEE Access 13:19898\u201319908. https:\/\/doi.org\/10.1109\/ACCESS.2025.3531338","journal-title":"IEEE Access"},{"key":"7545_CR45","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TDSC.2024.3429503","volume":"22","author":"S Wang","year":"2024","unstructured":"Wang S, Gai K, Yu J, Zhu L, Wu H, Wei C, Yan Y, Zhang H, Choo K-KR (2024) Rafls: Rdp-based adaptive federated learning with shuffle model. IEEE Trans Dependable Secure Comput 22:1181\u20131194","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7545_CR46","doi-asserted-by":"publisher","unstructured":"Han W, Xue J, Wang Y, Liu Z, Kong Z (2019) Malinsight: A systematic profiling based malware detection framework. Journal of Network and Computer Applications 125:236\u2013250. https:\/\/doi.org\/10.1016\/j.jnca.2018.10.022. Accessed 2023-01-04","DOI":"10.1016\/j.jnca.2018.10.022."},{"key":"7545_CR47","unstructured":"MITRE Corporation (2024) MITRE ATT &CK\u00ae: Adversarial Tactics, Techniques, and Common Knowledge https:\/\/attack.mitre.org\/ Accessed 2024-08-27"},{"key":"7545_CR48","unstructured":"Microsoft Corporation (2024) Microsoft Graph REST API Documentation. https:\/\/learn.microsoft.com\/en-us\/graph\/api\/overview Accessed 2024-10-01"},{"issue":"3","key":"7545_CR49","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1109\/COMST.2023.3273282","volume":"25","author":"N Sun","year":"2023","unstructured":"Sun N, Ding M, Jiang J, Xu W, Mo X, Tai Y, Zhang J (2023) Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Commun Surv Tutor 25(3):1748\u20131774. https:\/\/doi.org\/10.1109\/COMST.2023.3273282","journal-title":"IEEE Commun Surv Tutor"},{"key":"7545_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102282","volume":"106","author":"Z Li","year":"2021","unstructured":"Li Z, Chen QA, Yang R, Chen Y, Ruan W (2021) Threat detection and investigation with system-level provenance graphs: A survey. Comput Security 106:102282. https:\/\/doi.org\/10.1016\/j.cose.2021.102282","journal-title":"Comput Security"},{"key":"7545_CR51","unstructured":"Richardson L (2007) Beautiful Soup Documentation https:\/\/www.crummy.com\/software\/BeautifulSoup\/"},{"key":"7545_CR52","unstructured":"McKie JX et al (2023) PyMuPDF: Python bindings for the MuPDF library https:\/\/pymupdf.readthedocs.io\/"},{"key":"7545_CR53","doi-asserted-by":"publisher","unstructured":"Bird S (2006) NLTK: The Natural Language Toolkit. In: Curran, J. (ed.) Proceedings of the COLING\/ACL 2006 Interactive Presentation Sessions, pp. 69\u201372. Association for Computational Linguistics, Sydney, Australia https:\/\/doi.org\/10.3115\/1225403.1225421","DOI":"10.3115\/1225403.1225421"},{"key":"7545_CR54","unstructured":"Honnibal M, Montani I (2023) spaCy: Industrial-strength Natural Language Processing in Python https:\/\/spacy.io\/"},{"key":"7545_CR55","unstructured":"Honnibal M, Montani I (2023) NeuralCoref: Coreference Resolution in spaCy with Neural Networks https:\/\/github.com\/explosion\/neuralcoref"},{"key":"7545_CR56","unstructured":"Nussbaum Z, Morris JX, Duderstadt B, Mulyar A (2024) Nomic Embed: Training a Reproducible Long Context Text Embedder arxiv: 2402.01613"},{"key":"7545_CR57","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26, pp. 3111\u20133119. Curran Associates, Inc., Lake Tahoe, Nevada, United States https:\/\/dl.acm.org\/doi\/10.5555\/2999792.2999959"},{"key":"7545_CR58","doi-asserted-by":"publisher","unstructured":"Pennington J, Socher R, Manning C (2014) GloVe: Global vectors for word representation. In: Moschitti, A., Pang, B., Daelemans, W. (eds.) Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543. Association for Computational Linguistics, Doha, Qatar https:\/\/doi.org\/10.3115\/v1\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"7545_CR59","unstructured":"Yang A, Yang B, Hui B, Zheng B, Yu B, Zhou C, Li C, Li C, Liu D, Huang F et al (2024) Qwen2 Technical Report arxiv: 2407.10671"},{"key":"7545_CR60","unstructured":"Team G, Mesnard T, Ha D, Tay Y, Wang X, Zhou D, Le QV, Dean J, Petrov S, Fiedel N et al (2024) Gemma: Open Models Based on Gemini Research and Technology arxiv: 2403.08295"},{"key":"7545_CR61","unstructured":"Touvron H, Lavril T, Izacard G, Martinet X, Lachaux M-A, Lacroix T, Rozi\u00e8re B, Goyal N, Hambro E, Azhar F, Rodriguez A, Joulin A, Grave E, Lample G (2023) LLaMA: Open and Efficient Foundation Language Models arxiv: 2302.13971"},{"key":"7545_CR62","unstructured":"Abdin MI, Jacobs SA et al (2024) Phi-3 Technical Report: A Highly Capable Language Model Locally on Your Phone arxiv: 2404.14219"},{"issue":"3","key":"7545_CR63","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/TBDATA.2019.2921572","volume":"7","author":"J Johnson","year":"2021","unstructured":"Johnson J, Douze M, J\u00e9gou H (2021) Billion-scale similarity search with gpus. IEEE Trans Big Data 7(3):535\u2013547. https:\/\/doi.org\/10.1109\/TBDATA.2019.2921572","journal-title":"IEEE Trans Big Data"},{"key":"7545_CR64","doi-asserted-by":"publisher","unstructured":"Min S, Krishna K, Lyu X, Lewis M, Yih W-t, Koh P, Iyyer M, Zettlemoyer L, Hajishirzi H (2023) FActScore: Fine-grained Atomic Evaluation of Factual Precision in Long form Text Generation. In: Bouamor, H., Pino, J., Bali, K. (eds.) Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, pp. 12076\u201312100. Association for Computational Linguistics, Singapore https:\/\/doi.org\/10.18653\/v1\/2023.emnlp-main.741","DOI":"10.18653\/v1\/2023.emnlp-main.741"},{"key":"7545_CR65","doi-asserted-by":"publisher","unstructured":"Satvat K, Gjomemo R, Venkatakrishnan VN (2021) Extractor: Extracting Attack Behavior from Threat Reports. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 598\u2013615 https:\/\/doi.org\/10.1109\/EuroSP51992.2021.00046","DOI":"10.1109\/EuroSP51992.2021.00046"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07545-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07545-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07545-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T09:37:12Z","timestamp":1750325832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07545-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":65,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["7545"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07545-8","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,19]]},"assertion":[{"value":"1 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors approve that the research presented in this paper is conducted following the principles of ethical and professional conduct.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"1049"}}