{"id":"https://openalex.org/W7118122774","doi":"https://doi.org/10.1186/s42400-025-00531-w","title":"Lotldetector: living off the land attacks detection system based on feature fusion","display_name":"Lotldetector: living off the land attacks detection system based on feature fusion","publication_year":2026,"publication_date":"2026-01-04","ids":{"openalex":"https://openalex.org/W7118122774","doi":"https://doi.org/10.1186/s42400-025-00531-w"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00531-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00531-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00531-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00531-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121906565","display_name":"Tiantian Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tiantian Zhu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100645737","display_name":"Jie Zheng","orcid":"https://orcid.org/0000-0002-4035-8520"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Zheng","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103063581","display_name":"Tieming Chen","orcid":"https://orcid.org/0000-0003-4664-3311"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tieming Chen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121598446","display_name":"Mingqi Lv","orcid":null},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingqi Lv","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, 310023, China","institution_ids":["https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121906590","display_name":"Chunlin Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunlin Xiong","raw_affiliation_strings":["China Unicom (Guangdong) Industrial Internet Company Ltd., Guangzhou, 510000, China"],"affiliations":[{"raw_affiliation_string":"China Unicom (Guangdong) Industrial Internet Company Ltd., Guangzhou, 510000, China","institution_ids":["https://openalex.org/I6507939"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079651155","display_name":"Zhengqiu Weng","orcid":"https://orcid.org/0000-0003-4175-6763"},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]},{"id":"https://openalex.org/I4400573270","display_name":"Wenzhou University of Technology","ror":"https://ror.org/03dd7qj98","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573270"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhengqiu Weng","raw_affiliation_strings":["School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, China"],"affiliations":[{"raw_affiliation_string":"School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, China","institution_ids":["https://openalex.org/I146620803","https://openalex.org/I4400573270"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121907339","display_name":"Xiangyang Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I146620803","display_name":"Wenzhou University","ror":"https://ror.org/020hxh324","country_code":"CN","type":"education","lineage":["https://openalex.org/I146620803"]},{"id":"https://openalex.org/I4400573270","display_name":"Wenzhou University of Technology","ror":"https://ror.org/03dd7qj98","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573270"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyang Zheng","raw_affiliation_strings":["School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, China"],"affiliations":[{"raw_affiliation_string":"School of Data Science and Artificial Intelligence, Wenzhou University of Technology, Wenzhou, 325035, China","institution_ids":["https://openalex.org/I146620803","https://openalex.org/I4400573270"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5079651155"],"corresponding_institution_ids":["https://openalex.org/I146620803","https://openalex.org/I4400573270"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02615012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.44940000772476196,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.44940000772476196,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.2207999974489212,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.06480000168085098,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7300999760627747},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5867000222206116},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5139999985694885},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47269999980926514},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4345000088214874},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3797000050544739},{"id":"https://openalex.org/keywords/expert-system","display_name":"Expert system","score":0.36739999055862427},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.328000009059906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8015000224113464},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7300999760627747},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5867000222206116},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4830999970436096},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47350001335144043},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47269999980926514},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4345000088214874},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38370001316070557},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3797000050544739},{"id":"https://openalex.org/C58328972","wikidata":"https://www.wikidata.org/wiki/Q184609","display_name":"Expert system","level":2,"score":0.36739999055862427},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.328000009059906},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.32510000467300415},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.3095000088214874},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.28299999237060547},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.2743000090122223},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.27129998803138733},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2590999901294708},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C2776973144","wikidata":"https://www.wikidata.org/wiki/Q6880649","display_name":"Misuse detection","level":4,"score":0.25690001249313354},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00531-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00531-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00531-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:90a74db859e44fbda2fb0a542025b948","is_oa":true,"landing_page_url":"https://doaj.org/article/90a74db859e44fbda2fb0a542025b948","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-21 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00531-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00531-w","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00531-w.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1083766541","display_name":null,"funder_award_id":"62372410","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3558286546","display_name":null,"funder_award_id":"62002324","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4020255992","display_name":null,"funder_award_id":"Project","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5760752404","display_name":null,"funder_award_id":"Projects","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6688104968","display_name":null,"funder_award_id":"620023","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G979421220","display_name":null,"funder_award_id":"LQ21F020016","funder_id":"https://openalex.org/F4320338464","funder_display_name":"Natural Science Foundation of Zhejiang Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320338464","display_name":"Natural Science Foundation of Zhejiang Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118122774.pdf","grobid_xml":"https://content.openalex.org/works/W7118122774.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W2790484531","https://openalex.org/W2797678261","https://openalex.org/W2896805421","https://openalex.org/W2900984776","https://openalex.org/W2914509622","https://openalex.org/W2941205140","https://openalex.org/W2963626623","https://openalex.org/W2985244210","https://openalex.org/W3091934055","https://openalex.org/W3148862282","https://openalex.org/W3152957156","https://openalex.org/W3205859170","https://openalex.org/W4226512862","https://openalex.org/W4288941200","https://openalex.org/W4313121063","https://openalex.org/W4387191719","https://openalex.org/W4387234384","https://openalex.org/W4387251739","https://openalex.org/W4388562958","https://openalex.org/W4389687949","https://openalex.org/W4396930243"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"In":[1,219],"recent":[2],"years,":[3],"Living":[4],"off":[5],"the":[6,29,77,114,183,186,199,202,215],"Land":[7],"(LotL)":[8],"attacks":[9,23,48,105],"have":[10],"been":[11,224],"drawing":[12],"attention":[13],"due":[14],"to":[15,31,65,98],"their":[16,36],"flexibility":[17],"and":[18,109,123,153,161],"difficulty":[19],"in":[20,28,72,103,177],"detection.":[21],"These":[22],"exploit":[24],"legitimate":[25],"tools":[26],"already":[27],"system":[30,87,188],"conduct":[32],"malicious":[33,37,100,179],"activities,":[34],"hiding":[35],"intent":[38],"behind":[39],"normal":[40],"benign":[41],"programs.":[42],"However,":[43],"detection":[44,74,86,134,187,191,204],"methods":[45,94,176],"for":[46,76,198],"such":[47],"largely":[49],"rely":[50],"on":[51,145],"expert":[52,96,128],"rules.":[53],"While":[54],"rule":[55,125],"tags":[56,126],"can":[57],"effectively":[58],"detect":[59,99],"known":[60],"attacks,":[61],"this":[62],"also":[63,206],"leads":[64],"a":[66,85,131,146,154,190],"high":[67],"false":[68],"positive":[69],"rate,":[70],"resulting":[71],"low":[73],"accuracy":[75,195,205],"models.":[78],"To":[79],"address":[80],"these":[81],"issues,":[82],"we":[83],"propose":[84],"called":[88],"LOTLDetector,":[89],"which":[90,209],"combines":[91,124],"deep":[92],"learning":[93],"with":[95,164,193],"rules":[97],"command":[101,117,151,159,180],"lines":[102,152],"LotL":[104,136],"from":[106,127],"both":[107],"data":[108],"knowledge":[110],"perspectives.":[111],"LOTLDetector":[112],"learns":[113],"semantics":[115],"of":[116,135,196],"line":[118],"text":[119],"through":[120],"neural":[121],"networks":[122],"knowledge,":[129],"enabling":[130],"more":[132],"comprehensive":[133],"attacks.":[137],"We":[138],"extensively":[139],"evaluated":[140],"our":[141,171,221],"method,":[142],"validated":[143],"it":[144,163],"Windows":[147,200],"dataset":[148,156],"containing":[149,157],"27,448":[150],"Linux":[155,184],"27,093":[158],"lines,":[160],"compared":[162],"existing":[165,175,217],"methods.":[166],"The":[167],"results":[168],"show":[169],"that":[170],"method":[172],"significantly":[173],"outperforms":[174],"detecting":[178],"lines.":[181],"For":[182],"dataset,":[185,201],"achieved":[189],"performance":[192],"an":[194],"0.9728;":[197],"system\u2019s":[203],"reached":[207],"0.9598,":[208],"is":[210],"about":[211],"8%":[212],"higher":[213],"than":[214],"best":[216],"method.":[218],"addition,":[220],"project":[222],"has":[223],"open-sourced":[225],"at":[226],"https://github.com/csedikaf/LOTLDetector":[227],".":[228]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2026-01-04T00:00:00"}
