共 254 条
[1]
Abbasian M, 2024, Arxiv, DOI arXiv:2310.02374
[2]
Ablikim M, 2023, J HIGH ENERGY PHYS, DOI 10.1007/JHEP03(2023)121
[4]
Abomhara M., 2015, J CYBER SECURITY, V4, P65, DOI [10.13052/jcsm2245-1439.414, DOI 10.13052/JCSM2245-1439.414]
[5]
Abrahams T O., 2024, Computer Science IT Research Journal, V5, P120, DOI [DOI 10.51594/CSITRJ.V5I.708, 10.51594/csitrj.v5i1.709, DOI 10.51594/CSITRJ.V5I1.709]
[7]
Aghaei Ehsan, 2023, Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (462), P39, DOI 10.1007/978-3-031-25538-0_3
[8]
Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models
[J].
2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE,
2023,
:1737-1749
[9]
Al-Daeef M.M., 2017, Lect. Notes Eng. Comput. Sci.
[10]
Al-Hawamleh A., 2024, INT J COMPUTING DIGI, V15, P1315, DOI DOI 10.12785/IJCDS/150193