Academic
Academic
Home
Research Interests
Publications
Research Projects
Teaching
Invited Talks
Awards
CV
Light
Dark
Automatic
2
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on May 2, 2024
PDF
DOI
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach
Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on May 2, 2024
PDF
DOI
Why Following Friends Can Hurt You: A Replication Study
This study is a methodological replication of the work originally published in Information Systems Research by Krasnova et al. (2015). …
Benjamin M. Ampel
,
Steven Ullman
Last updated on Sep 6, 2023
PDF
Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022
Although machine learning-based anti-phishing detectors have provided promising results in phishing website detection, they remain …
Yang Gao
,
Benjamin M. Ampel
,
Sagar Samtani
Last updated on May 2, 2024
PDF
DOI
An example journal article
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis posuere tellus ac convallis placerat. Proin tincidunt magna sed ex sollicitudin condimentum.
Benjamin M. Ampel
,
Robert Ford
Last updated on Sep 5, 2023
PDF
Cite
Code
Slides