John D. Hastings

Orcid: 0000-0003-0871-3622

Affiliations:
  • Dakota State University, Madison, SD, USA


According to our database1, John D. Hastings authored at least 38 papers between 1995 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LibLMFuzz: LLM-Augmented Fuzz Target Generation for Black-box Libraries.
CoRR, July, 2025

A Systematic Review and Taxonomy for Privacy Breach Classification: Trends, Gaps, and Future Directions.
CoRR, May, 2025

TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code.
IEEE Access, 2025

Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code.
Proceedings of the 13th International Symposium on Digital Forensics and Security, 2025

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs.
Proceedings of the 13th International Symposium on Digital Forensics and Security, 2025

Advancing DevSecOps in SMEs: Challenges and Best Practices for Secure CI/CD Pipelines.
Proceedings of the 13th International Symposium on Digital Forensics and Security, 2025

Assessing Evasion Attacks on Tree-Based Machine Learning Models: Supervised vs. Unsupervised Approaches.
Proceedings of the IEEE International Conference on Consumer Electronics, 2025

2024
CEKER: A Generalizable LLM Framework for Literature Analysis with a Case Study in Unikernel Security.
CoRR, 2024

Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code.
CoRR, 2024

A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals.
CoRR, 2024

The Psychological Impacts of Algorithmic and AI-Driven Social Media on Teenagers: A Call to Action.
CoRR, 2024

Analyzing LLMs' Capabilities to Establish Implicit User Sentiment of Software Desirability.
CoRR, 2024

Cyber Security Operations Educational Gamification Application Listing.
CoRR, 2024

SETC: A Vulnerability Telemetry Collection Framework.
CoRR, 2024

A Survey of Unikernel Security: Insights and Trends from a Quantitative Analysis.
CoRR, 2024

Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code.
CoRR, 2024

Transforming Information Systems Management: A Reference Model for Digital Engineering Integration.
CoRR, 2024

Confronting the Reproducibility Crisis: A Case Study in Validating Certified Robustness.
CoRR, 2024

Microsegmented Cloud Network Architecture Using Open-Source Tools for a Zero Trust Foundation.
Proceedings of the 17th International Conference on Security of Information and Networks, 2024

The Trajectory of Romance Scams in the U.S.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Using LLMs to Establish Implicit User Sentiment of Software Desirability.
Proceedings of the International Conference on Machine Learning and Applications, 2024

Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy.
Proceedings of the International Conference on Computer and Applications, 2024

Toward an Insider Threat Education Platform: A Theoretical Literature Review.
Proceedings of the International Conference on Computer and Applications, 2024

Toward Automated Knowledge Discovery in Case-Based Reasoning.
Proceedings of the Thirty-Seventh International Florida Artificial Intelligence Research Society Conference, 2024

Utilizing Large Language Models to Synthesize Product Desirability Datasets.
Proceedings of the IEEE International Conference on Big Data, 2024

2023
Assessing User Experiences with ZORQ: A Gamification Framework for Computer Science Education.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
ZORQ: A Gamification Framework for Computer Science Education.
Proceedings of the IEEE Frontiers in Education Conference, 2022

2021
A Classification Scheme for Gamification in Computer Science Education: Discovery of Foundational Gamification Genres in Data Structures Courses.
Proceedings of the IEEE Frontiers in Education Conference, 2021

2016
A cross-curricular approach to fostering innovation such as virtual reality development through student-led projects.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2014
Early Assessment of an Approach to Determining the Predictive Coverage of Case-Based Reasoning with Adaptation through CARMA.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2010
CARMA: Assessing Usability through a Non-Biased Online Survey Technique.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Sustainability of Grasshopper Management and Support through CARMA.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2007
Good CARMA for the High Plains.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2005
Evaluating the Effectiveness of Exploration and Accumulated Experience in Automatic Case Elicitation.
Proceedings of the Case-Based Reasoning, 2005

On the Effectiveness of Automatic Case Elicitation in a More Complex Domain.
Proceedings of the 6th International Conference on Case-Based Reasoning, 2005

2002
CARMA: A Case-Based Rangeland Management Adviser.
AI Mag., 2002

2001
CARMA: A Case-Based Range Management Advisor.
Proceedings of the Thirteenth Innovative Applications of Artificial Intelligence Conference, 2001

1995
Case Adaption Using an Incomplete Causal Model.
Proceedings of the Case-Based Reasoning Research and Development, 1995


  Loading...