<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cyber Threat Intelligence | Benjamin M. Ampel</title><link>https://bampel.com/tag/cyber-threat-intelligence/</link><atom:link href="https://bampel.com/tag/cyber-threat-intelligence/index.xml" rel="self" type="application/rss+xml"/><description>Cyber Threat Intelligence</description><generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><lastBuildDate>Thu, 01 Jan 2026 00:00:00 +0000</lastBuildDate><image><url>https://bampel.com/media/icon_hu_cc9cb5646de94589.png</url><title>Cyber Threat Intelligence</title><link>https://bampel.com/tag/cyber-threat-intelligence/</link></image><item><title>A Computational Design Framework for Targeted Disruption of Hacker Communities</title><link>https://bampel.com/journal_publication/hacker-communities-isf/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid>https://bampel.com/journal_publication/hacker-communities-isf/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1007/s10796-025-10645-8" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1007/s10796-025-10645-8" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1007/s10796-025-10645-8" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1007%2fs10796-025-10645-8" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;p class="pub-muted">No artifacts listed yet.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/journal_publication/attack-link-jmis/">Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach&lt;/a>
&lt;span>2024 · Journal of Management Information Systems&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/journal_publication/dtl-el-misq/">Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach&lt;/a>
&lt;span>2024 · MIS Quarterly&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/journal_publication/phish-dtrap/">Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022&lt;/a>
&lt;span>2023 · Digital Threats: Research and Practice&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel (2026). A Computational Design Framework for Targeted Disruption of Hacker Communities. Information Systems Frontiers https://doi.org/10.1007/s10796-025-10645-8&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;%282026%29.&amp;#43;A&amp;#43;Computational&amp;#43;Design&amp;#43;Framework&amp;#43;for&amp;#43;Targeted&amp;#43;Disruption&amp;#43;of&amp;#43;Hacker&amp;#43;Communities.&amp;#43;Information&amp;#43;Systems&amp;#43;Frontiers&amp;#43;https%3A%2F%2Fdoi.org%2F10.1007%2Fs10796-025-10645-8" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel.&amp;#43;2026.&amp;#43;%22A&amp;#43;Computational&amp;#43;Design&amp;#43;Framework&amp;#43;for&amp;#43;Targeted&amp;#43;Disruption&amp;#43;of&amp;#43;Hacker&amp;#43;Communities.%22&amp;#43;Information&amp;#43;Systems&amp;#43;Frontiers&amp;#43;https%3A%2F%2Fdoi.org%2F10.1007%2Fs10796-025-10645-8" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40article%7Bmpel2026a%2C%0A&amp;#43;&amp;#43;title%3D%7BA&amp;#43;Computational&amp;#43;Design&amp;#43;Framework&amp;#43;for&amp;#43;Targeted&amp;#43;Disruption&amp;#43;of&amp;#43;Hacker&amp;#43;Communities%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel%7D%2C%0A&amp;#43;&amp;#43;journal%3D%7BInformation&amp;#43;Systems&amp;#43;Frontiers%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2026%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1007%2Fs10796-025-10645-8%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach</title><link>https://bampel.com/journal_publication/dtl-el-misq/</link><pubDate>Fri, 01 Mar 2024 00:00:00 +0000</pubDate><guid>https://bampel.com/journal_publication/dtl-el-misq/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.25300/MISQ/2023/17316" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.25300/MISQ/2023/17316" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.25300/MISQ/2023/17316" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.25300%2fMISQ%2f2023%2f17316" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://misq.umn.edu/creating-proactive-cyber-threat-intelligence-with-hacker-exploit-labels-a-deep-transfer-learning-approach.html" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/conference_publication/dtlel-isi/">Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/journal_publication/voice-phishing-misq/">Automatically Detecting Voice Phishing: A Large Audio Model Approach&lt;/a>
&lt;span>2026 · MIS Quarterly&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/journal_publication/attack-link-jmis/">Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach&lt;/a>
&lt;span>2024 · Journal of Management Information Systems&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, &amp;amp; Hsinchun Chen (2024). Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach. MIS Quarterly https://doi.org/10.25300/MISQ/2023/17316&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282024%29.&amp;#43;Creating&amp;#43;Proactive&amp;#43;Cyber&amp;#43;Threat&amp;#43;Intelligence&amp;#43;with&amp;#43;Hacker&amp;#43;Exploit&amp;#43;Labels%3A&amp;#43;A&amp;#43;Deep&amp;#43;Transfer&amp;#43;Learning&amp;#43;Approach.&amp;#43;MIS&amp;#43;Quarterly&amp;#43;https%3A%2F%2Fdoi.org%2F10.25300%2FMISQ%2F2023%2F17316" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2024.&amp;#43;%22Creating&amp;#43;Proactive&amp;#43;Cyber&amp;#43;Threat&amp;#43;Intelligence&amp;#43;with&amp;#43;Hacker&amp;#43;Exploit&amp;#43;Labels%3A&amp;#43;A&amp;#43;Deep&amp;#43;Transfer&amp;#43;Learning&amp;#43;Approach.%22&amp;#43;MIS&amp;#43;Quarterly&amp;#43;https%3A%2F%2Fdoi.org%2F10.25300%2FMISQ%2F2023%2F17316" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40article%7Bmpel2024creating%2C%0A&amp;#43;&amp;#43;title%3D%7BCreating&amp;#43;Proactive&amp;#43;Cyber&amp;#43;Threat&amp;#43;Intelligence&amp;#43;with&amp;#43;Hacker&amp;#43;Exploit&amp;#43;Labels%3A&amp;#43;A&amp;#43;Deep&amp;#43;Transfer&amp;#43;Learning&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hongyi&amp;#43;Zhu&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;journal%3D%7BMIS&amp;#43;Quarterly%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2024%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.25300%2FMISQ%2F2023%2F17316%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach</title><link>https://bampel.com/journal_publication/attack-link-jmis/</link><pubDate>Fri, 01 Mar 2024 00:00:00 +0000</pubDate><guid>https://bampel.com/journal_publication/attack-link-jmis/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1080/07421222.2023.2301178" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1080/07421222.2023.2301178" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1080/07421222.2023.2301178" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1080%2f07421222.2023.2301178" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://www.tandfonline.com/doi/abs/10.1080/07421222.2023.2301178" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/journal_publication/hacker-communities-isf/">A Computational Design Framework for Targeted Disruption of Hacker Communities&lt;/a>
&lt;span>2026 · Information Systems Frontiers&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/journal_publication/dtl-el-misq/">Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach&lt;/a>
&lt;span>2024 · MIS Quarterly&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/journal_publication/voice-phishing-misq/">Automatically Detecting Voice Phishing: A Large Audio Model Approach&lt;/a>
&lt;span>2026 · MIS Quarterly&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen, &amp;amp; Jay F. Nunamaker Jr. (2024). Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach. Journal of Management Information Systems https://doi.org/10.1080/07421222.2023.2301178&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;Hsinchun&amp;#43;Chen%2C&amp;#43;%26&amp;#43;Jay&amp;#43;F.&amp;#43;Nunamaker&amp;#43;Jr.&amp;#43;%282024%29.&amp;#43;Improving&amp;#43;Threat&amp;#43;Mitigation&amp;#43;Through&amp;#43;a&amp;#43;Cybersecurity&amp;#43;Risk&amp;#43;Management&amp;#43;Framework%3A&amp;#43;A&amp;#43;Computational&amp;#43;Design&amp;#43;Science&amp;#43;Approach.&amp;#43;Journal&amp;#43;of&amp;#43;Management&amp;#43;Information&amp;#43;Systems&amp;#43;https%3A%2F%2Fdoi.org%2F10.1080%2F07421222.2023.2301178" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;Hsinchun&amp;#43;Chen%2C&amp;#43;and&amp;#43;Jay&amp;#43;F.&amp;#43;Nunamaker&amp;#43;Jr..&amp;#43;2024.&amp;#43;%22Improving&amp;#43;Threat&amp;#43;Mitigation&amp;#43;Through&amp;#43;a&amp;#43;Cybersecurity&amp;#43;Risk&amp;#43;Management&amp;#43;Framework%3A&amp;#43;A&amp;#43;Computational&amp;#43;Design&amp;#43;Science&amp;#43;Approach.%22&amp;#43;Journal&amp;#43;of&amp;#43;Management&amp;#43;Information&amp;#43;Systems&amp;#43;https%3A%2F%2Fdoi.org%2F10.1080%2F07421222.2023.2301178" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40article%7Bmpel2024improving%2C%0A&amp;#43;&amp;#43;title%3D%7BImproving&amp;#43;Threat&amp;#43;Mitigation&amp;#43;Through&amp;#43;a&amp;#43;Cybersecurity&amp;#43;Risk&amp;#43;Management&amp;#43;Framework%3A&amp;#43;A&amp;#43;Computational&amp;#43;Design&amp;#43;Science&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hongyi&amp;#43;Zhu&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;and&amp;#43;Jay&amp;#43;F.&amp;#43;Nunamaker&amp;#43;Jr.%7D%2C%0A&amp;#43;&amp;#43;journal%3D%7BJournal&amp;#43;of&amp;#43;Management&amp;#43;Information&amp;#43;Systems%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2024%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1080%2F07421222.2023.2301178%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach</title><link>https://bampel.com/conference_publication/ransomware-bitcoin-isi-2023/</link><pubDate>Sun, 01 Oct 2023 00:00:00 +0000</pubDate><guid>https://bampel.com/conference_publication/ransomware-bitcoin-isi-2023/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1109/ISI58743.2023.10297290" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1109/ISI58743.2023.10297290" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1109/ISI58743.2023.10297290" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1109%2fISI58743.2023.10297290" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://ieeexplore.ieee.org/document/10297290" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-github-isi/">Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-ci-isi/">Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/exploit-sharing-hackers-isi/">Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2021 · IEEE ISI&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel, Kaeli Otto, Sagar Samtani, Hongyi Zhu, &amp;amp; Hsinchun Chen (2023). Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach. IEEE ISI https://doi.org/10.1109/ISI58743.2023.10297290&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Kaeli&amp;#43;Otto%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282023%29.&amp;#43;Disrupting&amp;#43;Ransomware&amp;#43;Actors&amp;#43;on&amp;#43;the&amp;#43;Bitcoin&amp;#43;Blockchain%3A&amp;#43;A&amp;#43;Graph&amp;#43;Embedding&amp;#43;Approach.&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI58743.2023.10297290" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Kaeli&amp;#43;Otto%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2023.&amp;#43;%22Disrupting&amp;#43;Ransomware&amp;#43;Actors&amp;#43;on&amp;#43;the&amp;#43;Bitcoin&amp;#43;Blockchain%3A&amp;#43;A&amp;#43;Graph&amp;#43;Embedding&amp;#43;Approach.%22&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI58743.2023.10297290" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40inproceedings%7Bmpel2023disrupting%2C%0A&amp;#43;&amp;#43;title%3D%7BDisrupting&amp;#43;Ransomware&amp;#43;Actors&amp;#43;on&amp;#43;the&amp;#43;Bitcoin&amp;#43;Blockchain%3A&amp;#43;A&amp;#43;Graph&amp;#43;Embedding&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Kaeli&amp;#43;Otto&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hongyi&amp;#43;Zhu&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;booktitle%3D%7BIEEE&amp;#43;ISI%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2023%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1109%2FISI58743.2023.10297290%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Mapping Exploit Code on Paste Sites to the MITRE ATT&amp;CK Framework: A Multi-label Transformer Approach</title><link>https://bampel.com/conference_publication/mitre-attandck-isi-2023/</link><pubDate>Sun, 01 Oct 2023 00:00:00 +0000</pubDate><guid>https://bampel.com/conference_publication/mitre-attandck-isi-2023/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1109/ISI58743.2023.10297272" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1109/ISI58743.2023.10297272" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1109/ISI58743.2023.10297272" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1109%2fISI58743.2023.10297272" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://ieeexplore.ieee.org/document/10297272" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/conference_publication/paste-site-21-isi/">Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach&lt;/a>
&lt;span>2021 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-github-isi/">Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/dtlel-isi/">Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel, Tala Vahedi, Sagar Samtani, &amp;amp; Hsinchun Chen (2023). Mapping Exploit Code on Paste Sites to the MITRE ATT&amp;amp;CK Framework: A Multi-label Transformer Approach. IEEE ISI https://doi.org/10.1109/ISI58743.2023.10297272&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Tala&amp;#43;Vahedi%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282023%29.&amp;#43;Mapping&amp;#43;Exploit&amp;#43;Code&amp;#43;on&amp;#43;Paste&amp;#43;Sites&amp;#43;to&amp;#43;the&amp;#43;MITRE&amp;#43;ATT%26CK&amp;#43;Framework%3A&amp;#43;A&amp;#43;Multi-label&amp;#43;Transformer&amp;#43;Approach.&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI58743.2023.10297272" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Tala&amp;#43;Vahedi%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2023.&amp;#43;%22Mapping&amp;#43;Exploit&amp;#43;Code&amp;#43;on&amp;#43;Paste&amp;#43;Sites&amp;#43;to&amp;#43;the&amp;#43;MITRE&amp;#43;ATT%26CK&amp;#43;Framework%3A&amp;#43;A&amp;#43;Multi-label&amp;#43;Transformer&amp;#43;Approach.%22&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI58743.2023.10297272" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40inproceedings%7Bmpel2023mapping%2C%0A&amp;#43;&amp;#43;title%3D%7BMapping&amp;#43;Exploit&amp;#43;Code&amp;#43;on&amp;#43;Paste&amp;#43;Sites&amp;#43;to&amp;#43;the&amp;#43;MITRE&amp;#43;ATT%26CK&amp;#43;Framework%3A&amp;#43;A&amp;#43;Multi-label&amp;#43;Transformer&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Tala&amp;#43;Vahedi&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;booktitle%3D%7BIEEE&amp;#43;ISI%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2023%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1109%2FISI58743.2023.10297272%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics</title><link>https://bampel.com/conference_publication/hack2vec-isi-2021/</link><pubDate>Mon, 01 Nov 2021 00:00:00 +0000</pubDate><guid>https://bampel.com/conference_publication/hack2vec-isi-2021/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1109/ISI53945.2021.9624848" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1109/ISI53945.2021.9624848" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1109/ISI53945.2021.9624848" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1109%2fISI53945.2021.9624848" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://par.nsf.gov/servlets/purl/10344545" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-github-isi/">Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/dtlel-isi/">Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-ci-isi/">Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel &amp;amp; Hsinchun Chen (2021). Distilling Contextual Embeddings Into A Static Word Embedding For Improving Hacker Forum Analytics. IEEE ISI https://doi.org/10.1109/ISI53945.2021.9624848&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282021%29.&amp;#43;Distilling&amp;#43;Contextual&amp;#43;Embeddings&amp;#43;Into&amp;#43;A&amp;#43;Static&amp;#43;Word&amp;#43;Embedding&amp;#43;For&amp;#43;Improving&amp;#43;Hacker&amp;#43;Forum&amp;#43;Analytics.&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI53945.2021.9624848" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2021.&amp;#43;%22Distilling&amp;#43;Contextual&amp;#43;Embeddings&amp;#43;Into&amp;#43;A&amp;#43;Static&amp;#43;Word&amp;#43;Embedding&amp;#43;For&amp;#43;Improving&amp;#43;Hacker&amp;#43;Forum&amp;#43;Analytics.%22&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI53945.2021.9624848" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40inproceedings%7Bmpel2021distilling%2C%0A&amp;#43;&amp;#43;title%3D%7BDistilling&amp;#43;Contextual&amp;#43;Embeddings&amp;#43;Into&amp;#43;A&amp;#43;Static&amp;#43;Word&amp;#43;Embedding&amp;#43;For&amp;#43;Improving&amp;#43;Hacker&amp;#43;Forum&amp;#43;Analytics%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;booktitle%3D%7BIEEE&amp;#43;ISI%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2021%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1109%2FISI53945.2021.9624848%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach</title><link>https://bampel.com/conference_publication/exploit-sharing-hackers-isi/</link><pubDate>Mon, 01 Nov 2021 00:00:00 +0000</pubDate><guid>https://bampel.com/conference_publication/exploit-sharing-hackers-isi/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1109/ISI53945.2021.9624846" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1109/ISI53945.2021.9624846" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1109/ISI53945.2021.9624846" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1109%2fISI53945.2021.9624846" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://par.nsf.gov/servlets/purl/10336834" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-github-isi/">Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-ci-isi/">Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/ransomware-bitcoin-isi-2023/">Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach&lt;/a>
&lt;span>2023 · IEEE ISI&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Kaeli Otto, Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, &amp;amp; Hsinchun Chen (2021). Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. IEEE ISI https://doi.org/10.1109/ISI53945.2021.9624846&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Kaeli&amp;#43;Otto%2C&amp;#43;Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282021%29.&amp;#43;Exploring&amp;#43;the&amp;#43;Evolution&amp;#43;of&amp;#43;Exploit-Sharing&amp;#43;Hackers%3A&amp;#43;&amp;#43;An&amp;#43;Unsupervised&amp;#43;Graph&amp;#43;Embedding&amp;#43;Approach.&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI53945.2021.9624846" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Kaeli&amp;#43;Otto%2C&amp;#43;Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2021.&amp;#43;%22Exploring&amp;#43;the&amp;#43;Evolution&amp;#43;of&amp;#43;Exploit-Sharing&amp;#43;Hackers%3A&amp;#43;&amp;#43;An&amp;#43;Unsupervised&amp;#43;Graph&amp;#43;Embedding&amp;#43;Approach.%22&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI53945.2021.9624846" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40inproceedings%7Btto2021exploring%2C%0A&amp;#43;&amp;#43;title%3D%7BExploring&amp;#43;the&amp;#43;Evolution&amp;#43;of&amp;#43;Exploit-Sharing&amp;#43;Hackers%3A&amp;#43;&amp;#43;An&amp;#43;Unsupervised&amp;#43;Graph&amp;#43;Embedding&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BKaeli&amp;#43;Otto&amp;#43;and&amp;#43;Benjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hongyi&amp;#43;Zhu&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;booktitle%3D%7BIEEE&amp;#43;ISI%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2021%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1109%2FISI53945.2021.9624846%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach</title><link>https://bampel.com/conference_publication/paste-site-21-isi/</link><pubDate>Mon, 01 Nov 2021 00:00:00 +0000</pubDate><guid>https://bampel.com/conference_publication/paste-site-21-isi/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1109/ISI53945.2021.9624765" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1109/ISI53945.2021.9624765" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1109/ISI53945.2021.9624765" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1109%2fISI53945.2021.9624765" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://par.nsf.gov/servlets/purl/10336827" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/conference_publication/mitre-attandck-isi-2023/">Mapping Exploit Code on Paste Sites to the MITRE ATT&amp;amp;CK Framework: A Multi-label Transformer Approach&lt;/a>
&lt;span>2023 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-github-isi/">Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/sawtooth-19-isi/">Performance Modeling of Hyperledger Sawtooth Blockchain&lt;/a>
&lt;span>2019 · IEEE ISI&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Tala Vahedi, Benjamin M. Ampel, Sagar Samtani, &amp;amp; Hsinchun Chen (2021). Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach. IEEE ISI https://doi.org/10.1109/ISI53945.2021.9624765&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Tala&amp;#43;Vahedi%2C&amp;#43;Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282021%29.&amp;#43;Identifying&amp;#43;and&amp;#43;Categorizing&amp;#43;Malicious&amp;#43;Content&amp;#43;on&amp;#43;Paste&amp;#43;Sites%3A&amp;#43;A&amp;#43;Neural&amp;#43;Topic&amp;#43;Modeling&amp;#43;Approach.&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI53945.2021.9624765" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Tala&amp;#43;Vahedi%2C&amp;#43;Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2021.&amp;#43;%22Identifying&amp;#43;and&amp;#43;Categorizing&amp;#43;Malicious&amp;#43;Content&amp;#43;on&amp;#43;Paste&amp;#43;Sites%3A&amp;#43;A&amp;#43;Neural&amp;#43;Topic&amp;#43;Modeling&amp;#43;Approach.%22&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI53945.2021.9624765" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40inproceedings%7Bahedi2021identifying%2C%0A&amp;#43;&amp;#43;title%3D%7BIdentifying&amp;#43;and&amp;#43;Categorizing&amp;#43;Malicious&amp;#43;Content&amp;#43;on&amp;#43;Paste&amp;#43;Sites%3A&amp;#43;A&amp;#43;Neural&amp;#43;Topic&amp;#43;Modeling&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BTala&amp;#43;Vahedi&amp;#43;and&amp;#43;Benjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;booktitle%3D%7BIEEE&amp;#43;ISI%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2021%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1109%2FISI53945.2021.9624765%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item><item><title>Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach</title><link>https://bampel.com/conference_publication/dtlel-isi/</link><pubDate>Sun, 01 Nov 2020 00:00:00 +0000</pubDate><guid>https://bampel.com/conference_publication/dtlel-isi/</guid><description>
&lt;div class="altmetric-badge-section" style="margin: 30px 0; padding: 20px; background: #f5f5f5; border-radius: 12px; border: 1px solid #ddd;">
&lt;style>
.dark .altmetric-badge-section {
background: rgba(10,10,10,0.6) !important;
border-color: #2a2a2a !important;
}
&lt;/style>
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">Altmetric Attention Score&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;div data-badge-type="medium-donut" data-doi="10.1109/ISI49825.2020.9280548" data-badge-popover="right" class="altmetric-embed">&lt;/div>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem; color: #888;">
This badge shows attention from news, blogs, social media, policy documents, and more.
&lt;a href="https://www.altmetric.com/details/doi/10.1109/ISI49825.2020.9280548" target="_blank" style="color: #00e5ff;">View details &lt;span aria-hidden="true">→&lt;/span>&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script type="text/javascript">
(function() {
function initBadge() {
if (typeof _altmetric_embed_init === 'function') {
_altmetric_embed_init();
} else {
var s = document.createElement('script');
s.src = 'https://d1bxh8uas1mnw7.cloudfront.net/assets/embed.js';
s.onload = function() {
if (typeof _altmetric_embed_init === 'function') _altmetric_embed_init();
};
document.head.appendChild(s);
}
}
if (document.readyState === 'complete') {
initBadge();
} else {
window.addEventListener('load', initBadge);
}
setTimeout(initBadge, 1000);
setTimeout(initBadge, 3000);
})();
&lt;/script>
&lt;div class="dimensions-badge-section">
&lt;h4 style="margin: 0 0 15px 0; font-size: 1rem; font-weight: 600;">📈 Dimensions Citation Metrics&lt;/h4>
&lt;div style="display: flex; align-items: center; gap: 20px; flex-wrap: wrap;">
&lt;span class="__dimensions_badge_embed__" data-doi="10.1109/ISI49825.2020.9280548" data-style="large_rectangle" data-legend="hover-right">&lt;/span>
&lt;div style="flex: 1; min-width: 200px;">
&lt;p style="margin: 0; font-size: 0.9rem;">
Dimensions tracks citations across scholarly literature, patents, clinical trials, and policy documents.
&lt;a href="https://app.dimensions.ai/discover/publication?search_text=10.1109%2fISI49825.2020.9280548" target="_blank">View full metrics →&lt;/a>
&lt;/p>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;script>
(function() {
if (typeof __dimensions_embed === 'undefined') {
var script = document.createElement('script');
script.src = 'https://badge.dimensions.ai/badge.js';
script.charset = 'utf-8';
script.onload = function() {
if (typeof __dimensions_embed !== 'undefined' &amp;&amp; __dimensions_embed.addBadges) {
__dimensions_embed.addBadges();
}
};
document.head.appendChild(script);
} else {
__dimensions_embed.addBadges();
}
})();
&lt;/script>
&lt;div class="pub-extras">
&lt;div class="pub-extras-grid">
&lt;div class="pub-extras-card">
&lt;h3>Key Contributions&lt;/h3>
&lt;p class="pub-muted">Key contributions will be added soon.&lt;/p>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Artifacts&lt;/h3>
&lt;div class="pub-artifacts">
&lt;a class="pub-chip" href="https://par.nsf.gov/servlets/purl/10252125" target="_blank" rel="noopener">PDF&lt;/a>
&lt;/div>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Related Papers&lt;/h3>
&lt;ul class="pub-related">
&lt;li>
&lt;a href="https://bampel.com/journal_publication/dtl-el-misq/">Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach&lt;/a>
&lt;span>2024 · MIS Quarterly&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-github-isi/">Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;li>
&lt;a href="https://bampel.com/conference_publication/vuln-ci-isi/">Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach&lt;/a>
&lt;span>2020 · IEEE ISI&lt;/span>
&lt;/li>
&lt;/ul>
&lt;/div>
&lt;div class="pub-extras-card">
&lt;h3>Citation&lt;/h3>
&lt;div class="pub-citation">
&lt;div class="pub-citation-text">Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, &amp;amp; Hsinchun Chen (2020). Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. IEEE ISI https://doi.org/10.1109/ISI49825.2020.9280548&lt;/div>
&lt;div class="pub-citation-actions">
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;Steven&amp;#43;Ullman%2C&amp;#43;%26&amp;#43;Hsinchun&amp;#43;Chen&amp;#43;%282020%29.&amp;#43;Labeling&amp;#43;Hacker&amp;#43;Exploits&amp;#43;for&amp;#43;Proactive&amp;#43;Cyber&amp;#43;Threat&amp;#43;Intelligence%3A&amp;#43;A&amp;#43;Deep&amp;#43;Transfer&amp;#43;Learning&amp;#43;Approach.&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI49825.2020.9280548" data-copy-label="APA">Copy APA&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="Benjamin&amp;#43;M.&amp;#43;Ampel%2C&amp;#43;Sagar&amp;#43;Samtani%2C&amp;#43;Hongyi&amp;#43;Zhu%2C&amp;#43;Steven&amp;#43;Ullman%2C&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen.&amp;#43;2020.&amp;#43;%22Labeling&amp;#43;Hacker&amp;#43;Exploits&amp;#43;for&amp;#43;Proactive&amp;#43;Cyber&amp;#43;Threat&amp;#43;Intelligence%3A&amp;#43;A&amp;#43;Deep&amp;#43;Transfer&amp;#43;Learning&amp;#43;Approach.%22&amp;#43;IEEE&amp;#43;ISI&amp;#43;https%3A%2F%2Fdoi.org%2F10.1109%2FISI49825.2020.9280548" data-copy-label="Chicago">Copy Chicago&lt;/button>
&lt;button class="pub-copy" type="button" data-copy-text="%40inproceedings%7Bmpel2020labeling%2C%0A&amp;#43;&amp;#43;title%3D%7BLabeling&amp;#43;Hacker&amp;#43;Exploits&amp;#43;for&amp;#43;Proactive&amp;#43;Cyber&amp;#43;Threat&amp;#43;Intelligence%3A&amp;#43;A&amp;#43;Deep&amp;#43;Transfer&amp;#43;Learning&amp;#43;Approach%7D%2C%0A&amp;#43;&amp;#43;author%3D%7BBenjamin&amp;#43;M.&amp;#43;Ampel&amp;#43;and&amp;#43;Sagar&amp;#43;Samtani&amp;#43;and&amp;#43;Hongyi&amp;#43;Zhu&amp;#43;and&amp;#43;Steven&amp;#43;Ullman&amp;#43;and&amp;#43;Hsinchun&amp;#43;Chen%7D%2C%0A&amp;#43;&amp;#43;booktitle%3D%7BIEEE&amp;#43;ISI%7D%2C%0A&amp;#43;&amp;#43;year%3D%7B2020%7D%2C%0A&amp;#43;&amp;#43;doi%3D%7B10.1109%2FISI49825.2020.9280548%7D%0A%7D" data-copy-label="BibTeX">Copy BibTeX&lt;/button>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;/div>
&lt;style>
.pub-extras { margin-top: 2rem; }
.pub-extras-grid { display:grid; grid-template-columns: repeat(auto-fit, minmax(240px, 1fr)); gap:16px; }
.pub-extras-card { border:1px solid var(--card-border, #333); border-radius:14px; padding:16px; background:var(--card-bg, rgba(0,0,0,0.25)); box-shadow:0 8px 20px rgba(0,0,0,0.12); }
.pub-extras-card h3 { margin:0 0 10px; font-size:0.9rem; text-transform:uppercase; letter-spacing:0.08em; color:#00ff41; }
.pub-extras-card ul { margin:0; padding-left:18px; }
.pub-extras-card li { margin-bottom:6px; font-size:0.82rem; line-height:1.4; }
.pub-muted { font-size:0.8rem; opacity:0.7; }
.pub-artifacts { display:flex; flex-wrap:wrap; gap:8px; }
.pub-chip { font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; padding:6px 10px; border-radius:999px; border:1px solid rgba(0,229,255,0.35); color:#bde8ff; background:rgba(0,229,255,0.1); text-decoration:none; }
.pub-related { list-style:none; padding:0; margin:0; display:flex; flex-direction:column; gap:8px; }
.pub-related li { display:flex; flex-direction:column; gap:2px; }
.pub-related a { color:#00e5ff; text-decoration:none; font-size:0.82rem; }
.pub-related span { font-size:0.72rem; opacity:0.7; }
.pub-citation { display:flex; flex-direction:column; gap:10px; }
.pub-citation-text { font-size:0.8rem; line-height:1.4; background:rgba(0,0,0,0.35); border-radius:10px; padding:10px; border:1px solid rgba(0,255,65,0.2); }
.pub-citation-actions { display:flex; flex-wrap:wrap; gap:8px; }
.pub-copy { align-self:flex-start; border-radius:999px; border:1px solid rgba(0,255,65,0.4); color:#00ff41; background:rgba(0,255,65,0.12); padding:6px 12px; font-size:0.7rem; text-transform:uppercase; letter-spacing:0.08em; cursor:pointer; }
.pub-copy.copied { color:#111; background:#00ff41; }
body:not(.dark) .pub-extras-card { background:rgba(255,255,255,0.92); }
body:not(.dark) .pub-extras-card h3 { color:#0b7a2f; }
body:not(.dark) .pub-citation-text { background:rgba(255,255,255,0.9); }
&lt;/style></description></item></channel></rss>