Picture for John D. Hastings

John D. Hastings

Gravity Falls: A Comparative Analysis of Domain-Generation Algorithm (DGA) Detection Methods for Mobile Device Spearphishing

Add code
Mar 03, 2026
Viaarxiv icon

Unsupervised Baseline Clustering and Incremental Adaptation for IoT Device Traffic Profiling

Add code
Feb 27, 2026
Viaarxiv icon

Quantifying Return on Security Controls in LLM Systems

Add code
Dec 17, 2025
Viaarxiv icon

An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection

Add code
Sep 08, 2025
Figure 1 for An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection
Figure 2 for An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection
Figure 3 for An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection
Figure 4 for An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection
Viaarxiv icon

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Add code
Feb 10, 2025
Figure 1 for Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs
Figure 2 for Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs
Figure 3 for Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs
Figure 4 for Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs
Viaarxiv icon

Toward an Insider Threat Education Platform: A Theoretical Literature Review

Add code
Dec 18, 2024
Viaarxiv icon

Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code

Add code
Dec 03, 2024
Figure 1 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Figure 2 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Figure 3 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Figure 4 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Viaarxiv icon

Utilizing Large Language Models to Synthesize Product Desirability Datasets

Add code
Nov 20, 2024
Figure 1 for Utilizing Large Language Models to Synthesize Product Desirability Datasets
Figure 2 for Utilizing Large Language Models to Synthesize Product Desirability Datasets
Figure 3 for Utilizing Large Language Models to Synthesize Product Desirability Datasets
Figure 4 for Utilizing Large Language Models to Synthesize Product Desirability Datasets
Viaarxiv icon

Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code

Add code
Sep 26, 2024
Figure 1 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Figure 2 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Figure 3 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Figure 4 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Viaarxiv icon

The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action

Add code
Aug 19, 2024
Figure 1 for The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action
Figure 2 for The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action
Viaarxiv icon