WANT A PROFILE LIKE THIS?
Create my FREE Plan Or learn about other options
Daniel Bilar
PeerJ Author
105 Points

Contributions by role

Preprint Author 105
Preprint Feedback 45
Answers 49
Questions 5

Contributions by subject area

Human-Computer Interaction
Adaptive and Self-Organizing Systems
Emerging Technologies
Optimization Theory and Computation
Software Engineering
Artificial Intelligence
Autonomous Systems
Social Computing
Computer Networks and Communications
Data Mining and Machine Learning
Ethical Issues
Science Policy
Statistics
Computational Science

By Q&A topic

Human-computer-interaction
Artificial-intelligence
Autonomous-systems
Social-computing
Ethical-issues
Science-policy
Statistics
Computational-science
Software-engineering

Daniel Yaacov Bilar

PeerJ Author

Summary

Expertise in quantitative compositional risk analysis / management, open-loop payments networks, offensive/defense cyber-security, threat modeling, SSDLC, moving target defenses, adversarial dynamics, management science.

SME in US Federal Court in computer security, programming, risk profiling, code logs and general forensics.

Former US DoD 6.1-6.3 researcher and project leader. Former assistant professor of computer science. One of seven founding members of the ISTS at Dartmouth, tech counter-terrorism research for US DoJ, DHS, DoD. Analyst.

Interdisciplinary since pre-fall USSR. PhD (Dartmouth), MEng (Cornell), BA (Brown).

Coupled Natural & Human Systems Emerging Technologies Optimization Theory & Computation Science Policy Security & Privacy Software Engineering

Past or current institution affiliations

Norwich University

Websites

  • Google Scholar

PeerJ Contributions

  • Preprints 2
  • Feedback 4
  • Questions 3
  • Answers 5
November 12, 2016 - Version: 2
Engineering permanence in finite systems
Daniel Bilar
https://doi.org/10.7287/peerj.preprints.2454v2
August 31, 2016 - Version: 1
The man-machine integration era
Daniel Bilar
https://doi.org/10.7287/peerj.preprints.2402v1

Provided feedback on

1 vote
12 Sep 2016

A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015

Dear Profs Özgür and Erdem Thank you for this needed too rare review. It is sobering that we may be basing security research directions and conclusions on a dataset which is ho...

20 Sep 2016

Engineering permanence in finite systems

Daniel Bilar (Sept 20, 2016): This extended abstract submission was rejected for a 5 minute lightning talk at SecDev 2016. With the permission of the PC chair, I am posting the un...

21 Nov 2016

Engineering permanence in finite systems

This 2 page extended abstract submission was rejected on Nov 21, 2016. I am posting the unedited, original reviewer comments below. This serves three pedagogical purposes 1) To...

23 Dec 2016

Anatomy of a crash repository

Much enjoyed this empirical work and will ponder what (if anything) can be inferred from the statistical distributions. I have two comments: 1) Crash reports have a potential...

3 Questions

1
In sec 5 CAUSES OF ENERGY DIFFERENCES, why was I/O not considered?
about What should mobile app developers do about machine learning and energy?
0
Kindly explain what you mean by the terse sentence: 'Communicating with IBM mainframe’s z/OS EBCDIC encoding constitutes an ASCII conversion, and IBM CKD disk format (via ubiquitous FBA) an Inception incentivization nightmare, respectively’
about Engineering permanence in finite systems
0
Matthew effect bias: Positioning decision ignores graduate students, collaborators contributions
about GRIND-FREE: Gaming-resistant index for research evaluation

5 Answers

0
accepted Kindly explain what you mean by the terse sentence: 'Communicating with IBM mainframe’s z/OS EBCDIC encoding constitutes an ASCII conversion, and IBM CKD disk format (via ubiquitous FBA) an Inception incentivization nightmare, respectively’
0
Deontological imprimatur: what, exactly, is it?
0
accepted Is it available a plain definition/explication of MTD suitable for not-specialists also?
0
accepted Is it possible to clear the concept of "optimization" in the sense it is used in the article?
0
accepted Outcome syncretism and behaviour performance map: what exactly are they?