Victor Benjamin

Asst Professor

  • 130 Citations
  • 6 h-Index
20122016
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 6 Similar Profiles
hacker Social Sciences
Learning systems Engineering & Materials Science
Internet Engineering & Materials Science
Recurrent neural networks Engineering & Materials Science
social movement Social Sciences
social media Social Sciences
Information retrieval Engineering & Materials Science
Social Movements Social Sciences

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2012 2016

  • 130 Citations
  • 6 h-Index
  • 9 Conference contribution
  • 2 Article
  • 1 Chapter

Conducting large-scale analyses of underground hacker communities

Benjamin, V., Samtani, S. & Chen, H., Jan 1 2016, Cybercrime Through an Interdisciplinary Lens. Taylor and Francis, p. 56-75 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

hacker
community
12 Citations (Scopus)

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

Benjamin, V., Zhang, B., Nunamaker, J. F. & Chen, H., Apr 2 2016, In : Journal of Management Information Systems. 33, 2, p. 482-510 29 p.

Research output: Contribution to journalArticle

Internet
World Wide Web
Participation
Threat
Malware
1 Citation (Scopus)

Identifying language groups within multilingual cybercriminal forums

Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supply chains
Neural networks
Language
Clustering
China
5 Citations (Scopus)

Developing understanding of hacker language through the use of lexical semantics

Benjamin, V. & Chen, H., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 79-84 6 p. 7165943

Research output: Chapter in Book/Report/Conference proceedingConference contribution

hacker
Recurrent neural networks
Semantics
semantics
neural network

Emotion extraction and entrainment in social media: The case of U.S. immigration and border security

Chung, W., He, S., Dajun Zeng, D. & Benjamin, V., Jul 23 2015, 2015 IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations, ISI 2015. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 7165939

Research output: Chapter in Book/Report/Conference proceedingConference contribution

social media
immigration
emotion
Personnel
Industry