Benjamin M. Ampel
Benjamin M. Ampel
Home
Research
Publications
Teaching
Awards
Service
CV
Contact
Light
Dark
Automatic
Cyber Threat Intelligence
A Computational Design Framework for Targeted Disruption of Hacker Communities
This paper presents a computational design framework for the targeted disruption of hacker communities. By leveraging advanced …
Benjamin M. Ampel
Last updated on Jan 28, 2026
DOI
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach
The rapid proliferation of complex information systems has been met by an ever-increasing quantity of exploits that can cause …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach
Cyberattacks have been increasing in volume and intensity, necessitating proactive measures. Cybersecurity risk management frameworks …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach
Ransomware attacks continue to pose significant threats to organizations worldwide, with attackers often demanding payment in Bitcoin. …
Benjamin M. Ampel
,
Kaeli Otto
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach
Paste sites serve as repositories for sharing code snippets, including malicious exploit code. Understanding how these exploits map to …
Benjamin M. Ampel
,
Tala Vahedi
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Jan 28, 2026
PDF
DOI
Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics
Hacker forums provide malicious actors with a large database of tutorials, goods, and assets to leverage for cyber-attacks. Careful …
Benjamin M. Ampel
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach
Cybercrime was estimated to cost the global economy $945 billion in 2020. Increasingly, law enforcement agencies are using social …
Kaeli Otto
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use …
Tala Vahedi
,
Benjamin M. Ampel
,
Sagar Samtani
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach
With the rapid development of new technologies, vulnerabilities are at an all-time high. Companies are investing in developing Cyber …
Benjamin M. Ampel
,
Sagar Samtani
,
Hongyi Zhu
,
Steven Ullman
,
Hsinchun Chen
Last updated on Jan 26, 2026
PDF
DOI