Victor Benjamin

Assistant Professor

Calculated based on number of publications stored in Pure and citations from Scopus
20122025

Research activity per year

Filter
Conference contribution

Search results

  • 2021

    Exploring Differences among Darknet and Surface Internet Hacking Communities

    Ding, Z., Benjamin, V., Li, W. & Yin, X., 2021, Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021. Institute of Electrical and Electronics Engineers Inc., (Proceedings - 2021 IEEE International Conference on Intelligence and Security Informatics, ISI 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2020

    Detecting Cyber-Adversarial Videos in Traditional Social media

    Du, B., Singhal, P., Benjamin, V. & Li, W., Nov 9 2020, Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020. Institute of Electrical and Electronics Engineers Inc., 9280476. (Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2016

    Identifying language groups within multilingual cybercriminal forums

    Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2015

    Developing understanding of hacker language through the use of lexical semantics

    Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Emotion extraction and entrainment in social media: The case of U.S. immigration and border security

    Chung, W., He, S., Dajun Zeng, D. & Benjamin, V., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 7165939. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops

    Benjamin, V., Li, W., Holt, T. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Zhou, L., Wang, G. A., Mao, W. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 85-90 6 p. 7165944. (2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    95 Scopus citations
  • 2014

    Descriptive analytics: Examining expert hackers in web forums

    Abbasi, A., Li, W., Benjamin, V., Hu, S. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 56-63 8 p. 6975554. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    55 Scopus citations
  • Time-to-event modeling for predicting hacker IRC community participant trajectory

    Benjamin, V. & Chen, H., Dec 4 2014, Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 6975550. (Proceedings - 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • 2013

    Evaluating text visualization: An experiment in authorship analysis

    Benjamin, V., Chung, W., Abbasi, A., Chuang, J., Larson, C. A. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 16-20 5 p. 6578778. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Machine learning for attack vector identification in malicious source code

    Benjamin, V. & Chen, H., Sep 9 2013, IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. p. 21-23 3 p. 6578779. (IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • 2012

    Securing cyberspace: Identifying key actors in hacker communities

    Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    66 Scopus citations