[1]
Imdad Ali Shah, Sorath Mahar, Ali Muhammad, and Saira Arbab, “EXPLORING SOFTWARE VULNERABILITIES AND CYBER THREATS LANDSCAPE USING MACHINE LEARNING: A COMPREHENSIVE REVIEW”, SES, vol. 4, no. 4, pp. 1346–1371, Apr. 2026.