Sledovat
Victor A. Benjamin
Název
Citace
Citace
Rok
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
V Benjamin, W Li, T Holt, H Chen
2015 IEEE international conference on intelligence and security informatics …, 2015
1402015
Securing cyberspace: Identifying key actors in hacker communities
V Benjamin, H Chen
2012 IEEE international conference on intelligence and security informatics …, 2012
1032012
Descriptive analytics: Examining expert hackers in web forums
A Abbasi, W Li, V Benjamin, S Hu, H Chen
2014 IEEE Joint Intelligence and Security Informatics Conference, 56-63, 2014
892014
Examining hacker participation length in cybercriminal internet-relay-chat communities
V Benjamin, B Zhang, JF Nunamaker Jr, H Chen
Journal of Management Information Systems 33 (2), 482-510, 2016
822016
DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.
V Benjamin, JS Valacich, H Chen
Mis Quarterly 43 (1), 2019
802019
Cybersecurity as an industry: A cyber threat intelligence perspective
S Samtani, M Abate, V Benjamin, W Li
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020
662020
Developing understanding of hacker language through the use of lexical semantics
V Benjamin, H Chen
2015 IEEE International Conference on Intelligence and Security Informatics …, 2015
322015
Stance detection with BERT embeddings for credibility analysis of information on social media
H Karande, R Walambe, V Benjamin, K Kotecha, TS Raghu
PeerJ Computer Science 7, e467, 2021
302021
Machine learning for attack vector identification in malicious source code
VA Benjamin, H Chen
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
282013
Bridging the virtual and real: The relationship between web content, linkage, and geographical proximity of social movements
V Benjamin, H Chen, D Zimbra
Journal of the Association for Information Science and Technology 65 (11 …, 2014
232014
Time-to-event modeling for predicting hacker IRC community participant trajectory
V Benjamin, H Chen
2014 IEEE Joint Intelligence and Security Informatics Conference, 25-32, 2014
212014
Evaluating text visualization for authorship analysis
V Benjamin, W Chung, A Abbasi, J Chuang, CA Larson, H Chen
Security Informatics 3, 1-13, 2014
182014
Informing cyber threat intelligence through dark Web situational awareness: The AZSecure hacker assets portal
S Samtani, W Li, V Benjamin, H Chen
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-10, 2021
162021
Evaluating text visualization: An experiment in authorship analysis
V Benjamin, W Chung, A Abbasi, J Chuang, CA Larson, H Chen
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
162013
Conducting large-scale analyses of underground hacker communities
V Benjamin, S Samtani, H Chen
Cybercrime through an interdisciplinary lens, 70-89, 2016
112016
Augmenting social bot detection with crowd-generated labels
V Benjamin, TS Raghu
Information Systems Research 34 (2), 487-507, 2023
102023
Identifying language groups within multilingual cybercriminal forums
V Benjamin, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 205-207, 2016
82016
Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives
V Benjamin
The University of Arizona, 2016
52016
Emotion extraction and entrainment in social media: The case of US immigration and border security
W Chung, S He, DD Zeng, V Benjamin
2015 IEEE International Conference on Intelligence and Security Informatics …, 2015
42015
Modeling interactions in web forums
W Li, A Abbasi, S Hu, V Benjamin
Academy of Science and Engineering (ASE), USA,© ASE 2014, 2014
42014
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20