Nathaniel D. Bastian
Orcid: 0000-0001-9957-2778
According to our database1,
Nathaniel D. Bastian
authored at least 61 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems.
Optim. Lett., December, 2024
IEEE Trans. Syst. Man Cybern. Syst., November, 2024
Multi-Memristor Based Distributed Decision Tree Circuit for Cybersecurity Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., August, 2024
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.
Commun. ACM, May, 2024
XG-NID: Dual-Modality Network Intrusion Detection using a Heterogeneous Graph Neural Network and Large Language Model.
CoRR, 2024
CoRR, 2024
CoRR, 2024
A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems.
Comput. Secur., 2024
A sequential deep learning framework for a robust and resilient network intrusion detection system.
Comput. Secur., 2024
Comput. Secur., 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
2023
SeNet-I: An approach for detecting network intrusions through serialized network traffic images.
Eng. Appl. Artif. Intell., November, 2023
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework.
Expert Syst. Appl., July, 2023
Neuro Symbolic Reasoning for Planning: Counterexample Guided Inductive Synthesis using Large Language Models and Satisfiability Solving.
CoRR, 2023
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation.
CoRR, 2023
Proceedings of the Winter Simulation Conference, 2023
Performance Analysis of Deep-Learning Based Open Set Recognition Algorithms for Network Intrusion Detection Systems.
Proceedings of the NOMS 2023, 2023
Proceedings of the IEEE Military Communications Conference, 2023
Counterexample Guided Inductive Synthesis Using Large Language Models and Satisfiability Solving.
Proceedings of the IEEE Military Communications Conference, 2023
Neurosymbolic AI in Cybersecurity: Bridging Pattern Recognition and Symbolic Reasoning.
Proceedings of the IEEE Military Communications Conference, 2023
Detecting Unknown Attacks in IoT Environments: An Open Set Classifier for Enhanced Network Intrusion Detection.
Proceedings of the IEEE Military Communications Conference, 2023
Dehallucinating Large Language Models Using Formal Methods Guided Iterative Prompting.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023
Novelty Detection in Network Traffic: Using Survival Analysis for Feature Identification.
Proceedings of the IEEE International Conference on Assured Autonomy, 2023
Preprocessing Network Traffic using Topological Data Analysis for Data Poisoning Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Towards Robust Learning using Diametrical Risk Minimization for Network Intrusion Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
RIDE: Real-time Intrusion Detection via Explainable Machine Learning Implemented in a Memristor Hardware Architecture.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
2022
Inf. Sci., 2022
Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems.
Expert Syst. Appl., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Payload-Byte: A Tool for Extracting and Labeling Packet Capture Files of Modern Network Intrusion Detection Datasets.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022
2021
Expert Syst. Appl., 2021
Anomaly Detection in Cybersecurity: Unsupervised, Graph-Based and Supervised Learning Methods in Adversarial Environments.
CoRR, 2021
Robust Decision-Making in the Internet of Battlefield Things Using Bayesian Neural Networks.
Proceedings of the Winter Simulation Conference, 2021
Proceedings of the Winter Simulation Conference, 2021
A Sensitivity Analysis of Poisoning and Evasion Attacks in Network Intrusion Detection System Machine Learning Models.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
An Adversarial Training Based Machine Learning Approach to Malware Classification under Adversarial Conditions.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Advancing the Research and Development of Assured Artificial Intelligence and Machine Learning Capabilities.
CoRR, 2020
CoRR, 2020
Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning, 2020
2019
CoRR, 2019
Solving The Army's Cyber Workforce Planning Problem Using Stochastic Optimization and Discrete-Event Simulation Modeling.
Proceedings of the 2019 Winter Simulation Conference, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2017
Interfaces, 2017
Expert Syst. Appl., 2017
Machine Learning and Statistical Techniques to Predict Sepsis: Unifying Previous Work.
Proceedings of the Summit on Clinical Research Informatics, 2017
2016
Multi-criteria logistics modeling for military humanitarian assistance and disaster relief aerial delivery operations.
Optim. Lett., 2016
Data analytics in health promotion: Health market segmentation and classification of total joint replacement surgery patients.
Expert Syst. Appl., 2016
2015
A maximum expected covering problem for locating and dispatching two classes of military medical evacuation air assets.
Optim. Lett., 2015
Interfaces, 2015
2013
Simul., 2013