Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops V Benjamin, W Li, T Holt, H Chen 2015 IEEE international conference on intelligence and security informatics …, 2015 | 139 | 2015 |
Securing cyberspace: Identifying key actors in hacker communities V Benjamin, H Chen 2012 IEEE international conference on intelligence and security informatics …, 2012 | 102 | 2012 |
Descriptive analytics: Examining expert hackers in web forums A Abbasi, W Li, V Benjamin, S Hu, H Chen 2014 IEEE Joint Intelligence and Security Informatics Conference, 56-63, 2014 | 88 | 2014 |
DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics. V Benjamin, JS Valacich, H Chen Mis Quarterly 43 (1), 2019 | 83 | 2019 |
Examining hacker participation length in cybercriminal internet-relay-chat communities V Benjamin, B Zhang, JF Nunamaker Jr, H Chen Journal of Management Information Systems 33 (2), 482-510, 2016 | 83 | 2016 |
Cybersecurity as an industry: A cyber threat intelligence perspective S Samtani, M Abate, V Benjamin, W Li The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020 | 71 | 2020 |
Stance detection with BERT embeddings for credibility analysis of information on social media H Karande, R Walambe, V Benjamin, K Kotecha, TS Raghu PeerJ Computer Science 7, e467, 2021 | 37 | 2021 |
Developing understanding of hacker language through the use of lexical semantics V Benjamin, H Chen 2015 IEEE International Conference on Intelligence and Security Informatics …, 2015 | 31 | 2015 |
Machine learning for attack vector identification in malicious source code VA Benjamin, H Chen 2013 IEEE International Conference on Intelligence and Security Informatics …, 2013 | 28 | 2013 |
Bridging the virtual and real: The relationship between web content, linkage, and geographical proximity of social movements V Benjamin, H Chen, D Zimbra Journal of the Association for Information Science and Technology 65 (11 …, 2014 | 23 | 2014 |
Time-to-event modeling for predicting hacker IRC community participant trajectory V Benjamin, H Chen 2014 IEEE Joint Intelligence and Security Informatics Conference, 25-32, 2014 | 21 | 2014 |
Evaluating text visualization for authorship analysis V Benjamin, W Chung, A Abbasi, J Chuang, CA Larson, H Chen Security Informatics 3, 1-13, 2014 | 18 | 2014 |
Informing cyber threat intelligence through dark Web situational awareness: The AZSecure hacker assets portal S Samtani, W Li, V Benjamin, H Chen Digital Threats: Research and Practice (DTRAP) 2 (4), 1-10, 2021 | 17 | 2021 |
Evaluating text visualization: An experiment in authorship analysis V Benjamin, W Chung, A Abbasi, J Chuang, CA Larson, H Chen 2013 IEEE International Conference on Intelligence and Security Informatics …, 2013 | 16 | 2013 |
Augmenting social bot detection with crowd-generated labels V Benjamin, TS Raghu Information Systems Research 34 (2), 487-507, 2023 | 13 | 2023 |
Conducting large-scale analyses of underground hacker communities V Benjamin, S Samtani, H Chen Cybercrime through an interdisciplinary lens, 70-89, 2016 | 10 | 2016 |
Identifying language groups within multilingual cybercriminal forums V Benjamin, H Chen 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 205-207, 2016 | 8 | 2016 |
Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives V Benjamin The University of Arizona, 2016 | 5 | 2016 |
Emotion extraction and entrainment in social media: The case of US immigration and border security W Chung, S He, DD Zeng, V Benjamin 2015 IEEE International Conference on Intelligence and Security Informatics …, 2015 | 4 | 2015 |
Modeling interactions in web forums W Li, A Abbasi, S Hu, V Benjamin Academy of Science and Engineering (ASE), USA,© ASE 2014, 2014 | 4 | 2014 |