Victor A. Benjamin

According to our database1, Victor A. Benjamin authored at least 15 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Exploring Differences Among Darknet and Surface Internet Hacking Communities.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
Detecting Cyber-Adversarial Videos in Traditional Social media.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

2019
DICE-E: A Framework for Conducting Darknet Identification, Collection, Evaluation with Ethics.
MIS Q., 2019

2016
Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities.
J. Manag. Inf. Syst., 2016

Identifying language groups within multilingual cybercriminal forums.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

2015
Emotion extraction and entrainment in social media: The case of U.S. immigration and border security.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Developing understanding of hacker language through the use of lexical semantics.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

2014
Evaluating text visualization for authorship analysis.
Secur. Informatics, 2014

Bridging the virtual and real: The relationship between web content, linkage, and geographical proximity of social movements.
J. Assoc. Inf. Sci. Technol., 2014

Time-to-Event Modeling for Predicting Hacker IRC Community Participant Trajectory.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Descriptive Analytics: Examining Expert Hackers in Web Forums.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

2013
Evaluating text visualization: An experiment in authorship analysis.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Machine learning for attack vector identification in malicious source code.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

2012
Securing cyberspace: Identifying key actors in hacker communities.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012


  Loading...