Benjamin Ampel

According to our database1, Benjamin Ampel authored at least 15 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Large Language Models for Conducting Advanced Text Analytics Information Systems Research.
CoRR, 2023

Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

Benchmarking the Robustness of Phishing Email Detection Systems.
Proceedings of the 29th Americas Conference on Information Systems, 2023

The Effect of Consensus Algorithm on Ethereum Price and Volume.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2021
Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach.
CoRR, 2021

Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

The Role of AI Agents for De-Escalating Commitment in Digital Innovation Projects.
Proceedings of the 42nd International Conference on Information Systems, 2021

2020
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach.
CoRR, 2020

Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
Performance Modeling of Hyperledger Sawtooth Blockchain.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019


  Loading...