Follow
Daniel Yaacov Bilar
Daniel Yaacov Bilar
Unknown affiliation
Verified email at pm.me
Title
Cited by
Cited by
Year
Opcodes as predictor for malware
D Bilar
International journal of electronic security and digital forensics 1 (2 …, 2007
4042007
Statistical structures: Fingerprinting malware for classification and analysis
D Bilar
Proceedings of Black Hat Federal 2006, 2006
382006
Quantitative risk analysis of computer networks
D Bilar
Dartmouth College, 2003
322003
Callgraph properties of executables
D Bilar
AI Communications 20 (4), 231-243, 2007
242007
On callgraphs and generative mechanisms
D Bilar
Journal in Computer Virology 3, 299-310, 2007
172007
Fingerprinting malicious code through statistical opcode analysis
D Bilar
ICGeS’07: Third International Conference on Global E-Security, 2007
162007
On self-reproducing computer programs
D Bilar, E Filiol
Journal in computer virology 5 (1), 9-87, 2009
152009
Adversarial dynamics: the conficker case study
D Bilar, G Cybenko, J Murphy
Moving Target Defense II: Application of Game Theory and Adversarial …, 2012
102012
Composition patterns of hacking
S Bratus, J Bangert, A Gabrovsky, A Shubina, D Bilar, ME Locasto
Proceedings of the 1st International Workshop on Cyber Patterns, 80-85, 2012
102012
Using a novel behavioral stimuli-response framework to defend against adversarial cyberspace participants
D Bilar, B Saltaformaggio
2011 3rd International Conference on Cyber Conflict, 1-16, 2011
82011
Degradation and subversion through subsystem attacks
D Bilar
IEEE Security & Privacy 8 (4), 70-73, 2010
62010
Machine learning applications in grid computing
G Cybenko, G Jiang, D Bilar
PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 1999
51999
‘Weird machine’patterns
S Bratus, J Bangert, A Gabrovsky, A Shubina, ME Locasto, D Bilar
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns …, 2014
42014
Noisy defenses: Subverting malware's OODA loop
D Bilar
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
42008
Statistical Structures: Tolerant fingerprinting for classification and analysis
D Bilar
Las Vegas, NV. Blackhat Briefings USA, 2006
32006
IEEE Transactions on Computational Social Systems
BIN HU, H ABBASS, M ALAZAB, D BILAR, H CAI, K CARLEY, X CHENG, ...
22022
Editors/translators foreword
D Bilar, E Filiol
Journal in Computer Virology 5, 1-3, 2009
22009
Known Knowns, Known Unknowns, and Unknown Unknowns: Anti-Virus Issues, Malicious Software and Internet Attacks for Non-Technical Audiences
D Bilar
Digital Evidence & Elec. Signature L. Rev. 6, 123, 2009
22009
Scale free distribution: Pareto and Zipf
D Bilar
CS 249B: Science of Network, Wellesley College, 2008
22008
Introduction to state-of-the-art intrusion detection technologies
D Bilar, D Burroughs
Enabling Technologies for Law Enforcement and Security 4232, 123-133, 2001
22001
The system can't perform the operation now. Try again later.
Articles 1–20