Y Du,
C Huang, G Liang, Z Fu, D Li, Y Ding - Applied Intelligence, 2023 - Springer
Malicious actors often utilize publicly available software vulnerabilities and exploit codes to
attack vulnerable targets. Exploit codes are shared across several platforms, including …