Opcodes as predictor for malware D Bilar International journal of electronic security and digital forensics 1 (2 …, 2007 | 411 | 2007 |
Statistical structures: Fingerprinting malware for classification and analysis D Bilar Proceedings of Black Hat Federal 2006, 2006 | 39 | 2006 |
Quantitative risk analysis of computer networks D Bilar Dartmouth College, 2003 | 33 | 2003 |
Callgraph properties of executables D Bilar AI Communications 20 (4), 231-243, 2007 | 25 | 2007 |
On callgraphs and generative mechanisms D Bilar Journal in Computer Virology 3, 299-310, 2007 | 17 | 2007 |
On self-reproducing computer programs D Bilar, E Filiol Journal in computer virology 5 (1), 9-87, 2009 | 16 | 2009 |
Fingerprinting malicious code through statistical opcode analysis D Bilar ICGeS’07: Third International Conference on Global E-Security, 2007 | 16 | 2007 |
Adversarial dynamics: the conficker case study D Bilar, G Cybenko, J Murphy Moving Target Defense II: Application of Game Theory and Adversarial …, 2012 | 10 | 2012 |
Composition patterns of hacking S Bratus, J Bangert, A Gabrovsky, A Shubina, D Bilar, ME Locasto Proceedings of the 1st International Workshop on Cyber Patterns, 80-85, 2012 | 10 | 2012 |
Using a novel behavioral stimuli-response framework to defend against adversarial cyberspace participants D Bilar, B Saltaformaggio 2011 3rd International Conference on Cyber Conflict, 1-16, 2011 | 8 | 2011 |
Degradation and subversion through subsystem attacks D Bilar IEEE Security & Privacy 8 (4), 70-73, 2010 | 6 | 2010 |
‘Weird machine’patterns S Bratus, J Bangert, A Gabrovsky, A Shubina, ME Locasto, D Bilar Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns …, 2014 | 5 | 2014 |
Machine learning applications in grid computing G Cybenko, G Jiang, D Bilar PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND …, 1999 | 5 | 1999 |
Noisy defenses: Subverting malware's OODA loop D Bilar Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 4 | 2008 |
Statistical Structures: Tolerant fingerprinting for classification and analysis D Bilar Las Vegas, NV. Blackhat Briefings USA, 2006 | 3 | 2006 |
IEEE Transactions on Computational Social Systems BIN HU, H ABBASS, M ALAZAB, D BILAR, H CAI, K CARLEY, X CHENG, ... | 2 | 2022 |
Editors/translators foreword D Bilar, E Filiol Journal in Computer Virology 5, 1-3, 2009 | 2 | 2009 |
Known Knowns, Known Unknowns, and Unknown Unknowns: Anti-Virus Issues, Malicious Software and Internet Attacks for Non-Technical Audiences D Bilar Digital Evidence & Elec. Signature L. Rev. 6, 123, 2009 | 2 | 2009 |
Scale free distribution: Pareto and Zipf D Bilar CS 249B: Science of Network, Wellesley College, 2008 | 2 | 2008 |
Introduction to state-of-the-art intrusion detection technologies D Bilar, D Burroughs Enabling Technologies for Law Enforcement and Security 4232, 123-133, 2001 | 2 | 2001 |