Alert button
Picture for Bobby Filar

Bobby Filar

Alert button

Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection

Add code
Bookmark button
Alert button
Dec 17, 2020
Edward Raff, William Fleshman, Richard Zak, Hyrum S. Anderson, Bobby Filar, Mark McLean

Figure 1 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 2 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 3 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Figure 4 for Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection
Viaarxiv icon

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors

Add code
Bookmark button
Alert button
Oct 22, 2020
Edward Raff, Bobby Filar, James Holt

Figure 1 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Figure 2 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Figure 3 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Figure 4 for Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors
Viaarxiv icon

Automatic Yara Rule Generation Using Biclustering

Add code
Bookmark button
Alert button
Sep 06, 2020
Edward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt

Figure 1 for Automatic Yara Rule Generation Using Biclustering
Figure 2 for Automatic Yara Rule Generation Using Biclustering
Figure 3 for Automatic Yara Rule Generation Using Biclustering
Figure 4 for Automatic Yara Rule Generation Using Biclustering
Viaarxiv icon

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation

Add code
Bookmark button
Alert button
Feb 20, 2018
Miles Brundage, Shahar Avin, Jack Clark, Helen Toner, Peter Eckersley, Ben Garfinkel, Allan Dafoe, Paul Scharre, Thomas Zeitzoff, Bobby Filar, Hyrum Anderson, Heather Roff, Gregory C. Allen, Jacob Steinhardt, Carrick Flynn, Seán Ó hÉigeartaigh, Simon Beard, Haydn Belfield, Sebastian Farquhar, Clare Lyle, Rebecca Crootof, Owain Evans, Michael Page, Joanna Bryson, Roman Yampolskiy, Dario Amodei

Figure 1 for The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Viaarxiv icon

DeepDGA: Adversarially-Tuned Domain Generation and Detection

Add code
Bookmark button
Alert button
Oct 06, 2016
Hyrum S. Anderson, Jonathan Woodbridge, Bobby Filar

Figure 1 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Figure 2 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Figure 3 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Figure 4 for DeepDGA: Adversarially-Tuned Domain Generation and Detection
Viaarxiv icon