[1]
“Using Large Language Models to Discover and Manage Cybersecurity Threats and Software Vulnerabilities”, HKIJRS, vol. 2, no. 2, pp. 87–94, Jul. 2024, doi: 10.64180/.