Applying the Diamond Model of Intrusion Analysis with Generative Pre-trained Transformer 3 | IEEE Conference Publication | IEEE Xplore