Article,

From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads.

, , , and .
CoRR, (2023)

Meta data

Tags

Users

  • @dblp

Comments and Reviews