Nathaniel D. Bastian

Orcid: 0000-0001-9957-2778

According to our database1, Nathaniel D. Bastian authored at least 61 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems.
Optim. Lett., December, 2024

A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System.
IEEE Trans. Syst. Man Cybern. Syst., November, 2024

Multi-Memristor Based Distributed Decision Tree Circuit for Cybersecurity Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., August, 2024

Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.
Commun. ACM, May, 2024

ACI IoT Network Traffic Dataset 2023.
Dataset, April, 2024

XG-NID: Dual-Modality Network Intrusion Detection using a Heterogeneous Graph Neural Network and Large Language Model.
CoRR, 2024

A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI.
CoRR, 2024

TrojFM: Resource-efficient Backdoor Attacks against Very Large Foundation Models.
CoRR, 2024

A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems.
Comput. Secur., 2024

A sequential deep learning framework for a robust and resilient network intrusion detection system.
Comput. Secur., 2024

AIS-NIDS: An intelligent and self-sustaining network intrusion detection system.
Comput. Secur., 2024

Seeing the Whole Elephant - A Comprehensive Framework for Data Education.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

Predicting F1-Scores of Classifiers in Network Intrusion Detection Systems.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

A Neuro-Symbolic Artificial Intelligence Network Intrusion Detection System.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
SeNet-I: An approach for detecting network intrusions through serialized network traffic images.
Eng. Appl. Artif. Intell., November, 2023

Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework.
Expert Syst. Appl., July, 2023

Transfer learning for raw network traffic detection.
Expert Syst. Appl., 2023

Real-time Network Intrusion Detection via Decision Transformers.
CoRR, 2023

Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving.
CoRR, 2023

Analysis of Media Writing Style Bias through Text-Embedding Networks.
CoRR, 2023

Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation.
CoRR, 2023

Measuring Classification Decision Certainty and Doubt.
CoRR, 2023

Uncertainty-Quantified, Robust Deep Learning for Network Intrusion Detection.
Proceedings of the Winter Simulation Conference, 2023

Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems.
Proceedings of the NOMS 2023, 2023

Challenges and Opportunities in Neuro-Symbolic Composition of Foundation Models.
Proceedings of the IEEE Military Communications Conference, 2023

Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving.
Proceedings of the IEEE Military Communications Conference, 2023

Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning.
Proceedings of the IEEE Military Communications Conference, 2023

Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection.
Proceedings of the IEEE Military Communications Conference, 2023

Dehallucinating Large Language Models Using Formal Methods Guided Iterative Prompting.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023

Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023

Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
A ranked solution for social media fact checking using epidemic spread modeling.
Inf. Sci., 2022

Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems.
Expert Syst. Appl., 2022

Off-Policy Evaluation for Action-Dependent Non-stationary Environments.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Context-aware Collaborative Neuro-Symbolic Inference in IoBTs.
Proceedings of the IEEE Military Communications Conference, 2022

Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

2021
Adversarial machine learning in Network Intrusion Detection Systems.
Expert Syst. Appl., 2021

Anomaly Detection in Cybersecurity: Unsupervised, Graph-Based and Supervised Learning Methods in Adversarial Environments.
CoRR, 2021

Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks.
Proceedings of the Winter Simulation Conference, 2021

CHALLENGES AND OPPORTUNITIES FOR GENERATIVE METHODS IN THE CYBER DOMAIN.
Proceedings of the Winter Simulation Conference, 2021

A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Evaluating Model Robustness to Adversarial Samples in Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
The spatially conscious machine learning model.
Stat. Anal. Data Min., 2020

Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities.
CoRR, 2020

Stacked Generalizations in Imbalanced Fraud Data Sets using Resampling Methods.
CoRR, 2020

Algorithm selection framework for cyber attack detection.
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020

2019
Intelligent Systems Design for Malware Classification Under Adversarial Conditions.
CoRR, 2019

Solving The Army's Cyber Workforce Planning Problem Using Stochastic Optimization and Discrete-Event Simulation Modeling.
Proceedings of the 2019 Winter Simulation Conference, 2019

Intelligent Feature Engineering for Cybersecurity.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2017
Optimizing Student Team and Job Assignments for the Holy Family Academy.
Interfaces, 2017

A hybrid recommender system using artificial neural networks.
Expert Syst. Appl., 2017

Machine Learning and Statistical Techniques to Predict Sepsis: Unifying Previous Work.
Proceedings of the Summit on Clinical Research Informatics, 2017

2016
Multi-criteria logistics modeling for military humanitarian assistance and disaster relief aerial delivery operations.
Optim. Lett., 2016

Data analytics in health promotion: Health market segmentation and classification of total joint replacement surgery patients.
Expert Syst. Appl., 2016

2015
A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets.
Optim. Lett., 2015

The AMEDD Uses Goal Programming to Optimize Workforce Planning Decisions.
Interfaces, 2015

2013
Rainwater harvesting system using a non-parametric stochastic rainfall generator.
Simul., 2013


  Loading...