Daniyel Yaacov BilarNorwich University | NUย ยทย School of Business and Management
Daniyel Yaacov Bilar
PhD
About
42
Publications
15,617
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
412
Citations
Introduction
AI B2B, R & D, practical AI ๐โ๐ ๐กโ๐๐ป ๐โ๐
AI Persona SoW evaluator https://poe.com/SoWEvaluator ๐โ๐ ๐กโ๐๐ป ๐โ๐
Bayer CEO Guth : AI fills out 70% - 80% of dossiers required by regulators.
๐โ๐ ๐กโ๐๐ป ๐โ๐
AI Persona Statistics SME https://hf.co/chat/r/xXHA_TN ๐โ๐ ๐กโ๐๐ป ๐โ๐
Mechanics of Humour w LLMs ie meta-cognitive exercise for LLM humor generation https://dybilar.mataroa.blog/blog/exploring-the-mechanics-of-humor-w-llms/ ๐โ๐ ๐กโ๐๐ป ๐โ๐
Additional affiliations
August 2006 - June 2008
August 2008 - June 2011
Education
August 1997 - June 2003
August 1996 - June 1997
August 1992 - May 1995
Publications
Publications (42)
This short note examines recent research challenging Google's 2019 claim of achieving quantum supremacy. We analyze three studies that raise significant concerns about the reliability and scalability of noisy intermediate-scale quantum (NISQ) computers, particularly in the context of random circuit sampling and quantum optimization. These studies e...
This short note contributes to the literature by showcasing a quantitative and comparative analysis of optimistic and pessimistic attacker modeling in automated cyber defense. It demonstrates, through simulation, that deviating from the conventional worst-case assumption can lead to significantly improved defender performance. This challenges estab...
This short note contributes to the literature by providing a comprehensive analysis of the strategic and tactical implications of kamikaze drones within the context of potential PLA actions against Taiwan. By examining the technical specifications of various unmanned combat aerial vehicles (UCAVs) and their suitability for asymmetric warfare, the s...
Can Compilers Sabotage Security? October 2024 research from ETH Zurich reveal that common compiler optimizations, designed to boost performance, can inadvertently introduce timing side-channel vulnerabilities into cryptographic libraries, even those rigorously verified at source level. This short note analyzes how these vulnerabilities impact attac...
## Humor, AI, and Catastrophe Theory
The wav file is a Google AI-generated podcast discussion about an experiment where an AI persona named Jerry is taught about humor using the framework of Catastrophe Theory. The speakers analyze a Discord transcript documenting this experiment. The theory, developed by mathematician Renรฉ Thom, focuses on sudden...
This short companion note provides a concise technical and tactical assessment of the Shahed-238 UCAV, drawing heavily from a SensusQ analysis by Rainer Pihlakas (April 2024). It highlights key features, potential vulnerabilities, and tactical deployment scenarios of this evolving Iranian drone.
Sarah and her husband Peter @dotMudge have been developing a software risk scoring scheme (binaries, not source code) with associated metrics. You should def. watch the video.
A wide range of heuristics that attackers use to identify which targets are hard or soft against new exploitation has been codified, refined, and enhanced. Some of these te...
The man-machine integration era (MMIE) is marked by sensor ubiquity, whose readings map human beings to finite numbers. These numbers - processed by continuously changing, optimizing/learning, finite precision, closed loop, distributed systems - are used to drive decisions such as insurance rates, prison sentencing, health care allocations and prob...
Through sensor ubiquity, the man-machine integration era is upon us. This integration is taking place in distributed, continuously changing, optimizing/learning, finite precision feedback systems. Security challenges of such systems abound, also due to constantly co-evolving threat actors and changing environments. Are we adequately preparing to de...
Through sensor ubiquity, the man-machine integration era is upon us. This integration is taking place in distributed, continuously changing, optimizing/learning, finite precision feedback systems. Security challenges of such systems abound, also due to constantly co-evolving threat actors and changing environments. Are we adequately preparing to de...
The man-machine integration era (MMIE) is marked by sensor ubiquity, whose readings map human beings to finite numbers. These numbers - processed by continuously changing, optimizing/learning, finite precision, closed loop, distributed systems - are used to drive decisions such as insurance rates, prison sentencing, health care allocations and prob...
You do not understand how your program really works until it has been exploited. We believe that computer scientists and software engineers should regard the activity of modern exploitation as an applied discipline that studies both the actual computational properties and the practical computational limits of a target platform or system. Exploit de...
You do not understand how your program really works until it has been exploited. We believe that computer scientists and software engineers should regard the activity of modern exploitation as an applied discipline that studies both the actual computational properties and the practical computational limits of a target platform or system. Exploit de...
It is well known that computer and network security is an adversarial challenge. Attackers develop exploits and defenders respond to them through updates, service packs or other defensive measures. In non-adversarial situations, such as automobile safety, advances on one side are not countered by the other side and so progress can be demonstrated o...
Companion talk to 2012/ 2013 paper on Conficker Adversarial Dynamics
It is well known that computer and network security is an ad- versarial challenge. Attackers develop exploits and defend- ers respond to them through updates, service packs or other defensive measures. In non-adversarial situations, such as automobile safety, advances on one side are not countered by the other side and so progress can be demonstrat...
We present adaptive computer network defenses with a focus on Smart Grid operations. We model Smart Grid network domains in the MESA-ExtendSim simulator and continu-ously measure mission assurance indicators (security proper-ties) to gauge the network's mission state. When thresholds are reached, a binary integer optimization problem is solved to i...
Autonomous Baiting, Control and Deception of Adversarial Cyberspace Participants (ABCD-ACP) is an experimental defensive framework against potentially adversarial cyberspace participants, such as malicious software and subversive insiders. By deploying fake targets (called baits/stimuli) onto a virtualized environment, the framework seeks to probab...
Attacks targeting something or someone indirectly-nth order attacks against end systems--have occurred on a large scale in real life. It goes to the heart of how conflicts between open societies and their enemies are waged: trust subsystems. Trust helps lower tangible and intangible transaction costs between individuals, corporations, and the state...
We simulate the biological operations of a DNA computational algorithm for a combinatorial problem. We then perform sensitivity analysis in which we vary bio-op error rates to see which bio-ops affect the end result. Finally, we review three approaches to tune the algorithm in order to minimize significant error.
**Historical Context**: The paper is a translation of Juergen Kraus' 1980 German MSc thesis on self-reproducing computer programs, which predated and foreshadowed significant developments in computer virology.
**Significant Findings**: Kraus' thesis demonstrated that self-reproduction in programs is weaker than recursion, with practical examples i...
An n th order attack seeks to degrade, disable or subvert an end system indirectly by targeting one or more end mission-sustaining ancillary systems. We discuss the vulnerability etiology enabling such attacks. We illustrate the notion of these attacks with concrete historical, current and forward-looking examples; also in the context of cyberwar a...
The question is how to deal in practice with complex evolved malicious software (malware). In light of recent empirical and theoretical findings, we propose moving beyond techniques premised on Turing Machine models towards iterative games and black-box process modeling within an interactive computational framework.
This paper examines the callgraphs of 120 malicious and 280 non-malicious executables. Pareto models are fitted to indegree, outdegree and basic block count distributions, and a statistically significant difference is shown for the derived power law exponent. A two-step optimization process is hypothesized to account for structural features of the...
This paper examines the structural features of callgraphs. The sample consisted of 120 malicious and 280 non-malicious executa-bles. Pareto models were fitted to in-degree, out-degree and basic block count distribution, and a statistically significant difference shown for the derived power law exponent. A two-step optimization process involving hum...
For practical purposes, information-gain adversarial malware may soon become undetectable using current function-based signature-matching AV techniques. We propose and sketch defenses that adopt an interactive approach, based on controlling information-centric Kullback-Leibler distances.
This paper examines the structural features of callgraphs. The sample consisted of 120 malicious and 280 non-malicious executables.
Pareto models were fitted to indegree, outdegree and basic block count distribution, and a statistically significant difference
shown for the derived power law exponent. A two-step optimization process involving human...
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. A total of 67 malware executables were sampled statically disassembled and their statistical opcode frequency distribution compared with the aggregate statistics of 20 non-malicious samples. We find that malware opcode distributions d...
This paper examines the callgraphs of 120 malicious and 280 non-malicious executables. Pareto models were fitted to in-degree, out-degree and basic block count distribution, and a statistically significant differ-ence shown for the derived power law exponent. Gen-erative mechanism are discussed and a two-step op-timization process, based on resourc...
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. A total of 67 malware executables were sampled statically disassembled and their statistical opcode frequency distribution compared with the aggregate statistics of 20 non-malicious samples. We find that malware opcode distributions d...
A safe communication infrastructure is critical to maintaining the prosperity and pre-eminence of the United States in the 21st century. Intrusion detection systems (IDS) help identify and respond to malicious activity targeted at computing and networking resources. In this paper, we shall first give an overview of intrusion detection concepts and...
The development of the World Wide Web has changed the way that we think about information. Information on the web is distributed, updates are made asynchronously and resources come and go online without centralized control. Global networking will similarly change the way we think about and perform computation. Grid computing refers to computing in...
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. 67 malware executables were sampled and their opcode frequency distribution statistically compared with the aggregate statistics of twenty non-malicious samples. It was found that malware opcode distributions differ statistically sign...
Covering four millennia and drawing from sources as eclectic as they are insightful, Robert Kaplan, a former Harvard mathematics professor, weaves a lively tale about the concept of zero. It is not so much a history book as it is a primer on zero-its genesis, etymology, representation, use, and ramifications. Artfully blending historiography with a...
Questions
Question (1)