Performance Modeling of Hyperledger Sawtooth Blockchain B Ampel, M Patton, H Chen 2019 IEEE International Conference on Intelligence and Security Informatics …, 2019 | 113 | 2019 |
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach B Ampel, S Samtani, S Ullman, H Chen Workshop on AI-enabled Cybersecurity Analytics, 2021 ACM Conference …, 2021 | 40 | 2021 |
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach B Ampel, S Samtani, H Zhu, S Ullman, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 37 | 2020 |
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach B Lazarine, S Samtani, M Patton, H Zhu, S Ullman, B Ampel, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 24 | 2020 |
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach S Ullman, S Samtani, B Lazarine, H Zhu, B Ampel, M Patton, H Chen 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 12 | 2020 |
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach BM Ampel, S Samtani, H Zhu, H Chen MIS Quarterly 48 (1), 137-166, 2024 | 8 | 2024 |
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach T Vahedi, B Ampel, S Samtani, H Chen 2021 IEEE International Conference on Intelligence and Security Informatics …, 2021 | 7 | 2021 |
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach BM Ampel, S Samtani, H Zhu, H Chen, JF Nunamaker Jr Journal of Management Information Systems 41 (1), 236-265, 2024 | 6 | 2024 |
Distilling Contextual Embeddings into a Static Word Embedding for Improving Hacker Forum Analytics B Ampel, H Chen 2021 IEEE International Conference on Intelligence and Security Informatics …, 2021 | 6 | 2021 |
Benchmarking the Robustness of Phishing Email Detection Systems BM Ampel, Y Gao, J Hu, S Samtani, H Chen 29th Americas' Conference on Information Systems (AMCIS), 1-10, 2023 | 4 | 2023 |
Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022 Y Gao, BM Ampel, S Samtani Digital Threats: Research and Practice (DTRAP) 5 (1), 1-8, 2024 | 3 | 2024 |
The Effect of Consensus Algorithm on Ethereum Price and Volume BM Ampel 29th Americas' Conference on Information Systems (AMCIS), 1-9, 2023 | 3 | 2023 |
Exploring the Evolution of Exploit-sharing Hackers: An Unsupervised Graph Embedding Approach K Otto, B Ampel, S Samtani, H Zhu, H Chen 2021 IEEE International Conference on Intelligence and Security Informatics …, 2021 | 3 | 2021 |
Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach B Ampel, K Otto, S Samtani, H Chen 2023 IEEE International Conference on Intelligence and Security Informatics …, 2023 | 2 | 2023 |
The Role of AI Agents for De-Escalating Commitment in Digital Innovation Projects C Marx, B Ampel, B Lazarine 42nd International Conference on Information Systems (ICIS), 1-8, 2021 | 2 | 2021 |
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach B Ampel, T Vahedi, S Samtani, H Chen 2023 IEEE International Conference on Intelligence and Security Informatics …, 2023 | 1 | 2023 |
Large Language Models for Conducting Advanced Text Analytics Information Systems Research BM Ampel, CH Yang, J Hu, H Chen ACM Transactions on Management Information Systems, 1-27, 2025 | | 2025 |
Why Following Friends Can Hurt You: A Replication Study BM Ampel, S Ullman AIS Transactions on Replication Research 9 (1), 2023 | | 2023 |