Benjamin M. Ampel

Benjamin M. Ampel

Assistant Professor in Computer Information Systems

Georgia State University

Biography

AI-enabled cybersecurity researcher building LLM and threat-intelligence systems that make defense proactive.
Bio Console
Choose a track to explore how the work fits together
    Biography
    Story Mode
    Builds AI-enabled cyber threat intelligence that turns adversary chatter into action, with LLM pipelines for phishing detection and early warning signals from hacker communities.

    Dr. Benjamin M. Ampel is an Assistant Professor in Computer Information Systems at Georgia State University’s J. Mack Robinson School of Business. He earned his Ph.D. from the University of Arizona under Dr. Hsinchun Chen, and his dissertation Securing Cyberspace: AI-Enabled Cyber-Adversary Defense received the ACM SIGMIS Doctoral Dissertation Award at ICIS 2024.Dissertation Award

    His research program builds AI-enabled cyber threat intelligence that turns adversary chatter into actionable defense. He mines hacker communities, analyzes phishing content, and develops Large Language Model applications for cybersecurity. His work appears in MIS Quarterly, Journal of Management Information Systems (JMIS), ACM TMIS, Information Systems Frontiers, and IEEE ISI, receiving Best Paper Awards at IEEE ISI 2020 and IEEE ISI 2023.Best Paper Awards

    From 2018-2021, he served as an NSF CyberCorps Scholarship-for-Service Fellow. He currently serves as Associate Editor for ACM Digital Threats: Research and Practice (DTRAP) and on the Editorial Board of Journal of Information Systems Education (JISE).Editorial Roles He has co-chaired the AI4Cyber Workshop at ACM KDD and the HICSS Junior Faculty Consortium. In 2025, he was recognized as the Robinson College of Business IS Cybersecurity Graduate Program Top Professor.Teaching Honor

    Career timeline
    2024 – Present
    Assistant Professor of Computer Information Systems
    Georgia State University, J. Mack Robinson School of Business
    2021 – 2024
    Adjunct Lecturer
    University of Arizona
    2018 – 2024
    Research Associate, AI Lab
    University of Arizona
    2018 – 2021
    NSF CyberCorps Scholarship-for-Service Fellow
    University of Arizona
    2019 – 2024
    Ph.D. in Management Information Systems
    University of Arizona • ACM SIGMIS Doctoral Dissertation Award
    2017 – 2019
    M.S. in Management Information Systems
    University of Arizona
    2013 – 2017
    B.S.B.A. in Management Information Systems
    University of Arizona • Outstanding Senior Award
    Research toolkit
    🤖 Large Language Models95%
    🔐 Cybersecurity & CTI95%
    🧠 Deep Learning / NLP90%
    📊 Data Science & Analytics90%
    🐍 Python / PyTorch / TensorFlow90%
    📝 Academic Writing95%
    🎤 Presentations & Teaching90%
    🔬 Design Science Research85%
    Signature threads
    • Threat intelligence pipelines that translate adversary text into operational alerts.
    • LLM-driven phishing detection and social engineering analysis.
    • Measurement of hacker communities for early warning signals.
    Education
    2009–2013
    High School
    Tucson High School
    2013–2015
    Undergraduate studies (no degree received)
    University of Pittsburgh
    2015–2017
    B.S.B.A., Management Information Systems
    University of Arizona
    2018–2019
    M.S., Management Information Systems
    University of Arizona
    2019–2024
    Ph.D., Management Information Systems
    University of Arizona

    Research Impact

    Impact Snapshot
    Updated --
    New in --
    Journal Articles
    --
    Conference Papers
    --
    Workshop Papers
    --
    Best Paper Awards
    --
    Q1 Journal Publications
    --
    FT50 Publications
    --
    UTD24 Publications
    --

    Selected Venues: MISQ • JMIS • ACM TMIS • ISF • IEEE ISI • HICSS • AMCIS • ICIS • ACM KDD

    📄 Download Research Summary (PDF) →

    📖 View Google Scholar Profile →


    📊 Research Dashboard

    Research Profile Topics

    Topic model inferred from academic outputs in the CV.
    Primary Focus
    ...
    Emerging Focus
    ...
    Total Citations
    0
    h-index
    0

    Citation Velocity

    Impact Map

    Connections by Topic, Venue & Co-authors

    Focus lens
    Click a node to reveal context, then pin highlights you want to keep.

    Network Centrality Analysis

    Density--
    Avg Path--
    Clustering--
    Calculating...
    Cohesion Radar
    Hover a paper to see how it connects across topic, venue, and co-author links.

    Collaboration Network

    Co-authorship Connections

    Collaborator spotlight
    Select a node to see their co-authorship footprint, top venues, and key connections.

    Research Footprint

    Conference Collaboration Institution
    Up to —
    Conference
    Collaboration
    Institution

    Traffic Overview

    --
    Total Visitors
    0
    Last 30 Days
    0

    Audience & Reach

    Top Locations
    Top Region: —
    Loading...
    🧭 Research Storylines

    Research Storylines

    Choose a track and step through the arc like a mini documentary.

    1 / 1
    Threat Intel → Communities → LLMs
    From exploit labeling to community disruption and LLM-driven analytics.

    Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach

    2020 · IEEE ISI
    Read paper →

    With the rapid development of new technologies, vulnerabilities are at an all-time high. Companies are investing in developing Cyber Threat Intelligence (CTI) to counteract these new vulnerabilities. However, this CTI is generally reactive based on internal data. Hacker forums can provide proactive CTI value through automated analysis of new trends and exploits. One way to identify exploits is by analyzing the source code that is posted on these forums. These source code snippets are often noisy and unlabeled, making standard data labeling techniques ineffective. This study aims to design a novel framework for the automated collection and categorization of hacker forum exploit source code. We propose a deep transfer learning framework, the Deep Transfer Learning for Exploit Labeling (DTL-EL). DTL-EL leverages the learned representation from professional labeled exploits to better generalize to hacker forum exploits. This model classifies the collected hacker forum exploits into eight predefined categories for proactive and timely CTI. The results of this study indicate that DTL-EL outperforms other prominent models in hacker forum literature.

    Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach

    2024 · MIS Quarterly
    Read paper →

    The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause irreparable cyber breaches. To mitigate these cyber threats, academia and industry have placed a significant focus on proactively identifying and labeling exploits developed by the international hacker community. However, prevailing approaches for labeling exploits in hacker forums do not leverage metadata from exploit DarkNet Markets, or public exploit repositories to enhance labeling performance. In this study, we adopted the computational design science paradigm to develop a novel information technology artifact, the Deep Transfer Learning Exploit Labeler (DTL-EL). DTL-EL incorporates a pre-initialization design, multi-layer deep transfer learning (DTL), and a self-attention mechanism to automatically label exploits in hacker forums. We rigorously evaluated the proposed DTL-EL against state-of-the-art non-DTL benchmark methods based in classical machine learning and deep learning. Results suggest that the proposed DTL-EL significantly outperforms benchmark methods based on accuracy, precision, recall, and F1-score. Our proposed DTL-EL framework provides important practical implications for key stakeholders such as cybersecurity managers, analysts, and educators.

    Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach

    2021 · IEEE ISI
    Read paper →

    Cybercrime was estimated to cost the global economy $945 billion in 2020. Increasingly, law enforcement agencies are using social network analysis (SNA) to identify key hackers from Dark Web hacker forums for targeted investigations. However, past approaches have primarily focused on analyzing key hackers at a single point in time and use a hacker’s structural features only. In this study, we propose a novel Hacker Evolution Identification Framework to identify how hackers evolve within hacker forums. The proposed framework has two novelties in its design. First, the framework captures features such as user statistics, node-level metrics, lexical measures, and post style, when representing each hacker with unsupervised graph embedding methods. Second, the framework incorporates mechanisms to align embedding spaces across multiple time-spells of data to facilitate analysis of how hackers evolve over time. Two experiments were conducted to assess the performance of prevailing graph embedding algorithms and nodal feature variations in the task of graph reconstruction in five time-spells. Results of our experiments indicate that Text-Associated Deep-Walk (TADW) with all of the proposed nodal features outperforms methods without nodal features in terms of Mean Average Precision in each time-spell. We illustrate the potential practical utility of the proposed framework with a case study on an English forum with 51,612 posts. The results produced by the framework in this case study identified key hackers posting piracy assets.

    A Computational Design Framework for Targeted Disruption of Hacker Communities

    2026 · Information Systems Frontiers
    Read paper →

    This paper presents a computational design framework for the targeted disruption of hacker communities. By leveraging advanced analytics and design science principles, the framework provides actionable intelligence for cybersecurity practitioners to proactively combat cyber threats emanating from underground hacker ecosystems.

    Automatic Extraction of Protected Health Information from Multilingual Hacker Communities

    2026 · HICSS
    Read paper →

    Protected Health Information (PHI, e.g., electronic health records, insurance information) is increasingly stolen in data breaches by malicious actors with the intent to sell to others in hacker communities. These actors often protect themselves by describing the content and availability of PHI data using encrypted messaging platforms (e.g., Telegram & Discord). In this research, we propose a Named Entity Recognition Framework for PHI (NERF-PHI) to systematically analyze PHI-related hacker conversations. We collected more than three million multilingual hacker posts from Discord servers and Telegram groups. Utilizing open-source machine translation tools, we translated conversations to English and extracted information related to vulnerable individuals and medical entities. Results suggest that encoder-based Large Language Models show significant promise for extracting PHI-related information from hacker communities.

    Large Language Models for Conducting Advanced Text Analytics Information Systems Research

    2025 · ACM Transactions on Management Information Systems
    Read paper →

    The exponential growth of digital content has generated massive textual datasets, necessitating the use of advanced analytical approaches. Large Language Models (LLMs) have emerged as tools that are capable of processing and extracting insights from massive unstructured textual datasets. However, how to leverage LLMs for text analytics Information Systems (IS) research is currently unclear. To assist the IS community in understanding how to operationalize LLMs, we propose a Text Analytics for Information Systems Research (TAISR) framework. Our proposed framework provides detailed recommendations grounded in IS and LLM literature on how to conduct meaningful text analytics IS research for design science, behavioral, and econometric streams. We conducted three business intelligence case studies using our TAISR framework to demonstrate its application in several IS research contexts. We also outline the potential challenges and limitations of adopting LLMs for IS. By offering a systematic approach and evidence of its utility, our TAISR framework contributes to future IS research streams looking to incorporate powerful LLMs for text analytics.

    Phishing & Social Engineering Defense
    How detection, evasion, and human-centered defenses evolve across the phishing stack.

    Benchmarking the Robustness of Phishing Email Detection Systems

    2023 · AMCIS
    Read paper →

    Phishing emails have emerged as one of the most common forms of social engineering attacks inflicting organizations. To combat this ever-present threat, organizations are turning toward AI-enabled phishing email detection systems (PEDS). However, the robustness of AI-enabled PEDS against adversarial text perturbations is currently unclear. In this study, we benchmark the robustness of prevailing AI-enabled PEDS against character, word, sentence, and multi-level adversarial text perturbations to quantitatively demonstrate how these systems respond to specific types of text-based attacks.

    Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022

    2023 · Digital Threats: Research and Practice
    Read paper →

    Although machine learning-based anti-phishing detectors have provided promising results in phishing website detection, they remain vulnerable to evasion attacks. The Machine Learning Security Evasion Competition 2022 (MLSEC 2022) provides researchers and practitioners with the opportunity to deploy evasion attacks against anti-phishing machine learning models in real-world settings. In this field note, we share our experience participating in MLSEC 2022. We manipulated the source code of ten phishing HTML pages provided by the competition using obfuscation techniques to evade anti-phishing models. Our evasion attacks employing a benign overlap strategy achieved third place in the competition with 46 out of a potential 80 points. The results of our MLSEC 2022 performance can provide valuable insights for research seeking to robustify machine learning-based anti-phishing detectors.

    Generating Adversarial Phishing Websites to Evade Machine Learning-based Anti-Phishing Detectors: A Reinforcement Learning Approach

    2023 · WDS
    Read paper →

    Machine learning-based anti-phishing detectors are widely deployed to protect users from malicious websites. This paper presents a reinforcement learning approach to generate adversarial phishing websites that can evade these detectors, revealing potential vulnerabilities in current defense mechanisms and informing the development of more robust detection systems.

    Email Phishing Prevention: An Explainable Nudging Approach

    2025 · WISP
    Read paper →

    Email phishing remains a persistent cybersecurity threat despite advances in technical defenses. This paper presents an explainable nudging approach for email phishing prevention, combining AI-driven threat detection with human-centric interventions. Drawing on research in behavioral economics and warning science, we develop and evaluate nudging mechanisms that help users recognize and avoid phishing attempts through interpretable warnings and educational cues. Our approach addresses the need for transparency in security systems while promoting long-term user learning beyond immediate threat detection.

    Examining the Robustness of Machine Learning-based Phishing Website Detection: Action-Masked Reinforcement Learning for Automated Red Teaming

    2025 · IEEE SPW
    Read paper →

    Machine learning-based phishing website detectors are increasingly deployed to protect users from malicious websites. However, these detectors remain vulnerable to adversarial evasion attacks. This paper presents an action-masked reinforcement learning approach for automated red teaming to systematically evaluate the robustness of these detectors, identifying vulnerabilities that adversaries could exploit to evade detection and informing the development of more robust defense mechanisms.

    Seeing Is Not Believing: A Deepfake Video Call Scam at Pan-Asia Trading

    2026 · Journal of Information Systems Education
    Read paper →

    This teaching case examines a deepfake video call scam that targeted Pan-Asia Trading, illustrating the emerging cybersecurity threats posed by AI-generated synthetic media. The case provides students with a hands-on opportunity to analyze the attack vectors, organizational vulnerabilities, and defensive strategies against deepfake-enabled social engineering attacks.

    Vulnerability & Infrastructure Security
    A vulnerability arc from open-source risks to ATT&CK alignment and remediation.

    Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

    2020 · IEEE ISI
    Read paper →

    The scientific cyberinfrastructure community heavily relies on public internet-based systems (e.g., GitHub) to share resources and collaborate. GitHub is one of the most powerful and popular systems for open source collaboration that allows users to share and work on projects in a public space for accelerated development and deployment. Monitoring GitHub for exposed vulnerabilities can save financial cost and prevent misuse and attacks of cyberinfrastructure. Vulnerability scanners that can interface with GitHub directly can be leveraged to conduct such monitoring. This research aims to proactively identify vulnerable communities within scientific cyberinfrastructure. We use social network analysis to construct graphs representing the relationships amongst users and repositories. We leverage prevailing unsupervised graph embedding algorithms to generate graph embeddings that capture the network attributes and nodal features of our repository and user graphs. This enables the clustering of public cyberinfrastructure repositories and users that have similar network attributes and vulnerabilities. Results of this research find that major scientific cyberinfrastructures have vulnerabilities pertaining to secret leakage and insecure coding practices for high-impact genomics research. These results can help organizations address their vulnerable repositories and users in a targeted manner.

    Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach

    2020 · IEEE ISI
    Read paper →

    The accelerated growth of computing technologies has provided interdisciplinary teams a platform for producing innovative research at an unprecedented speed. Advanced scientific cyberinfrastructures, in particular, provide data storage, applications, software, and other resources to facilitate the development of critical scientific discoveries. Users of these environments often rely on custom developed virtual machine (VM) images that are comprised of a diverse array of open source applications. These can include vulnerabilities undetectable by conventional vulnerability scanners. This research aims to identify the installed applications, their vulnerabilities, and how they vary across images in scientific cyberinfrastructure. We propose a novel unsupervised graph embedding framework that captures relationships between applications, as well as vulnerabilities identified on corresponding GitHub repositories. This embedding is used to cluster images with similar applications and vulnerabilities. We evaluate cluster quality using Silhouette, Calinski-Harabasz, and Davies-Bouldin indices, and application vulnerabilities through inspection of selected clusters. Results reveal that images pertaining to genomics research in our research testbed are at greater risk of high-severity shell spawning and data validation vulnerabilities.

    Linking Common Vulnerabilities and Exposures to the MITRE ATT&CK Framework: A Self-Distillation Approach

    2021 · AI4Cyber-KDD
    Read paper →

    Common Vulnerabilities and Exposures (CVEs) are used by cybersecurity analysts, networks, and endpoints managers to identify and address system vulnerabilities. The MITRE ATT&CK framework provides mitigation techniques for malicious tactics and can assist organizations in addressing their vulnerabilities. This paper presents a CVE Transformer (CVET) that uses fine-tuning and self-knowledge distillation to automatically link CVEs to relevant ATT&CK tactics, enabling more efficient threat assessment and prioritization of vulnerability remediation efforts.

    Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach

    2023 · IEEE ISI
    Read paper →

    Paste sites serve as repositories for sharing code snippets, including malicious exploit code. Understanding how these exploits map to known attack techniques is crucial for threat intelligence. This paper presents a multi-label transformer approach to automatically map exploit code found on paste sites to the MITRE ATT&CK framework, enabling security analysts to quickly understand the potential impact and techniques employed by attackers.

    Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach

    2023 · IEEE ISI
    Read paper →

    Ransomware attacks continue to pose significant threats to organizations worldwide, with attackers often demanding payment in Bitcoin. This paper presents a graph embedding approach to identify and disrupt ransomware actors on the Bitcoin blockchain by analyzing transaction patterns and wallet relationships, enabling proactive intervention strategies.

    Large Language Models for Infrastructure as Code Vulnerability Remediation

    2025 · WISP
    Read paper →

    Infrastructure as Code (IaC) has become essential for modern DevOps practices, enabling automated provisioning and management of cloud infrastructure. However, security vulnerabilities and misconfigurations in IaC scripts pose significant risks to organizations. This paper explores the application of large language models (LLMs) for automatically detecting and remediating vulnerabilities in IaC configurations. We evaluate the effectiveness of LLMs in identifying security weaknesses and generating secure code fixes, advancing automated security solutions for cloud infrastructure management.

    Publications

    📚 Publications (Search & Filter)
    Filter Publications
    Type
    Year
    Venue
    Co-author
    🧪 Paper Diff View

    Paper Diff View

    Pick two papers to see how they diverge across topics, coauthors, venues, and centrality role.

    Teaching

    Teaching Outcomes
    Aggregate metrics from course evaluations
    Average Eval
    -
    Courses Taught
    0
    Institutions
    0
    Top Eval
    -
    Institution Mix
    🎓 Georgia State University (7 courses)
    CourseTitleSemesterEvaluation
    CIS 8684Cyber Threat IntelligenceSpring 2026-
    CIS 4730Deep Learning for BusinessSpring 2026-
    CIS 8080IS Security and PrivacyFall 20254.9/5
    CIS 3620Career PathwaysSummer 20255.0/5
    CIS 8684Cyber Threat IntelligenceSpring 20254.9/5
    CIS 4680Intro to SecuritySpring 20254.7/5
    CIS 8080IS Security and PrivacyFall 20244.9/5

    Notable: Co-developed CIS 4730: Deep Learning for Business (2025); Proposed and developed CIS 8684: Cyber Threat Intelligence (2024)

    📚 University of Arizona - Adjunct/GTA (7 courses)
    CourseTitleSemesterEvaluation
    MIS 562Cyber Threat IntelligenceFall 20234.6/5
    MIS 611DTopics in Data Mining (GTA)Spring 2023-
    MIS 464Data Analytics (GTA)Spring 2023-
    MIS 562Cyber Threat IntelligenceFall 20224.7/5
    MIS 561Data Visualization (GTA)Summer 2022-
    MIS 562Cyber Threat IntelligenceFall 20214.5/5
    MIS 562Cyber Threat IntelligenceSummer 20214.0/5

    Invited Talks & Presentations

    🎤 Invited Talks (7)
    Talks Timeline
    Invited talks, workshops, and conference presentations

    Honors & Awards

    🏆 Awards & Honors (12)
    Awards Timeline
    Scroll or click a year

    Professional Service

    Service Impact
    Editorial, leadership, and community contributions
    Total Roles
    0
    Active Commitments
    0
    Editorial Appointments
    0
    Community Service
    0
    Committees + reviewing

    Public Engagement & Media Coverage

    Media Spotlight
    Coverage, interviews, and public engagement

    Contact

    • bampel@gsu.edu
    • 55 Park Place NW, Atlanta, GA 30303
    • J. Mack Robinson School of Business, Department of Computer Information Systems