[1]
John Robert Lim, “Application of Transformer-Based Architectures for Detecting Evolving Malware Patterns in Large-Scale Network Logs”, IJETRD, vol. 5, no. 2, pp. 31–36, Aug. 2024, Accessed: Mar. 22, 2026. [Online]. Available: https://ijetrd.com/index.php/ijetrd/article/view/IJETRD_05_02_006