Seguir
Daniel Yaacov Bilar
Daniel Yaacov Bilar
Afiliación desconocida
Dirección de correo verificada de pm.me
Título
Citado por
Citado por
Año
Opcodes as predictor for malware
D Bilar
International journal of electronic security and digital forensics 1 (2 …, 2007
4242007
Statistical structures: Fingerprinting malware for classification and analysis
D Bilar
Proceedings of Black Hat Federal 2006, 2006
392006
Quantitative risk analysis of computer networks
D Bilar
Dartmouth College, 2003
342003
Callgraph properties of executables
D Bilar
AI Communications 20 (4), 231-243, 2007
252007
On callgraphs and generative mechanisms
D Bilar
Journal in Computer Virology 3, 299-310, 2007
172007
On self-reproducing computer programs
D Bilar, E Filiol
Journal in computer virology 5 (1), 9-87, 2009
162009
Fingerprinting malicious code through statistical opcode analysis
D Bilar
ICGeS’07: Third International Conference on Global E-Security, 2007
162007
Adversarial dynamics: the conficker case study
D Bilar, G Cybenko, J Murphy
Moving Target Defense II: Application of Game Theory and Adversarial …, 2012
102012
Composition patterns of hacking
S Bratus, J Bangert, A Gabrovsky, A Shubina, D Bilar, ME Locasto
Proceedings of the 1st International Workshop on Cyber Patterns, 80-85, 2012
102012
Using a novel behavioral stimuli-response framework to defend against adversarial cyberspace participants
D Bilar, B Saltaformaggio
2011 3rd International Conference on Cyber Conflict, 1-16, 2011
82011
Degradation and subversion through subsystem attacks
D Bilar
IEEE Security & Privacy 8 (4), 70-73, 2010
62010
Weird Machine
S Bratus, J Bangert, A Gabrovsky, A Shubina, ME Locasto, D Bilar
Patterns. In Clive Blackwell and Hong Zhu, editors, Cyberpatterns, 157-171, 0
6
‘Weird machine’patterns
S Bratus, J Bangert, A Gabrovsky, A Shubina, ME Locasto, D Bilar
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns …, 2014
52014
Noisy defenses: Subverting malware's OODA loop
D Bilar
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
52008
Machine learning applications in grid computing
G Cybenko, G Jiang, D Bilar
PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 1999
51999
Statistical Structures: Tolerant fingerprinting for classification and analysis
D Bilar
Las Vegas, NV. Blackhat Briefings USA, 2006
32006
IEEE Transactions on Computational Social Systems
BIN HU, H ABBASS, M ALAZAB, D BILAR, H CAI, K CARLEY, X CHENG, ...
22022
Editors/translators foreword
D Bilar, E Filiol
Journal in Computer Virology 5, 1-3, 2009
22009
Known Knowns, Known Unknowns, and Unknown Unknowns: Anti-Virus Issues, Malicious Software and Internet Attacks for Non-Technical Audiences
D Bilar
Digital Evidence & Elec. Signature L. Rev. 6, 123, 2009
22009
Scale free distribution: Pareto and Zipf
D Bilar
CS 249B: Science of Network, Wellesley College, 2008
22008
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20