Find Research Outputs

Search concepts
Selected Filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Author

  • Hsinchun Chen
2016

Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities

Benjamin, V., Zhang, B., Nunamaker, J. F. & Chen, H., Apr 2 2016, In : Journal of Management Information Systems. 33, 2, p. 482-510 29 p.

Research output: Contribution to journalArticle

22 Scopus citations

Exploring key hackers and cybersecurity threats in Chinese hacker communities

Fang, Z., Zhao, X., Wei, Q., Chen, G., Zhang, Y., Xing, C., Li, W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. 7745436

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Exploring the online underground marketplaces through topic-based social network and clustering

Huang, S. Y. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 145-150 6 p. 7745458

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Health-related spammer detection on chinese social media

Chen, X., Zhang, Y., Xu, J., Xing, C. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 284-295 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System

Li, W., Chen, H. & Nunamaker, J. F., Oct 1 2016, In : Journal of Management Information Systems. 33, 4, p. 1059-1086 28 p.

Research output: Contribution to journalArticle

17 Scopus citations

Identifying devices across the IPv4 address space

Jicha, R., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 199-201 3 p. 7745469

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying high quality carding services in underground economy using nonparametric supervised topic model

Li, W., Yin, J. & Chen, H., 2016, 2016 International Conference on Information Systems, ICIS 2016. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying language groups within multilingual cybercriminal forums

Benjamin, V. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 205-207 3 p. 7745471

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques

Samtani, S., Yu, S., Zhu, H., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. 7745438

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Identifying the socio-spatial dynamics of terrorist attacks in the Middle East

Li, Z., Sun, D., Chen, H. & Huang, S. Y., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 175-180 6 p. 7745463

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Identifying top listers in Alphabay using Latent Dirichlet Allocation

Grisham, J., Barreras, C., Afarin, C., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 219 1 p. 7745477

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Intelligence and security informatics: 11th Pacific Asia workshop, PAISI 2016 Auckland, New Zealand, April 19, 2016 proceedings

Chau, M., Alan Wang, G. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9650. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9650).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modeling one-mode projection of bipartite networks by tagging vertex information

Qiao, J., Meng, Y. Y., Chen, H., Huang, H. Q. & Li, G. Y., Sep 1 2016, In : Physica A: Statistical Mechanics and its Applications. 457, p. 270-279 10 p.

Research output: Contribution to journalArticle

6 Scopus citations

NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks

Jiang, S. & Chen, H., Mar 1 2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 3, p. 729-740 12 p., 7303952.

Research output: Contribution to journalArticle

3 Scopus citations

NATERGM: A model for examining the role of Nodal Attributes in dynamic social media networks

Jiang, S. & Chen, H., Jun 22 2016, 2016 IEEE 32nd International Conference on Data Engineering, ICDE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1458-1459 2 p. 7498373

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Preface

Zheng, X., Zeng, D., Chen, H. & Leischow, S. J., 2016, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9545, p. VI

Research output: Contribution to journalArticle

SCADA honeypots: An in-depth analysis of Conpot

Jicha, A., Patton, M. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 196-198 3 p. 7745468

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Sentiment analysis on chinese health forums: A preliminary study of different language models

Zhang, Y., Zhang, Y., Xu, J., Xing, C. & Chen, H., Jan 1 2016, Smart Health - International Conference, ICSH 2015, Revised Selected Papers. Chen, H., Zeng, D. D., Zheng, X. & Leischow, S. J. (eds.). Springer-Verlag, p. 68-81 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Shodan visualized

Ercolani, V. J., Patton, M. W. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 193-195 3 p. 7745467

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Silverlink: Smart home health monitoring for senior care

Chuang, J., Maimoon, L., Yu, S., Zhu, H., Nybroe, C., Hsiao, O., Li, S. H., Lu, H. & Chen, H., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9545. p. 3-14 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9545).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Targeting key data breach services in underground supply chain

Li, W., Yin, J. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 322-324 3 p. 7745501

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Tracing topic discussions with the event-driven sir model for online forums

Woo, J., Ha, S. H. & Chen, H., May 1 2016, In : Journal of Electronic Commerce Research. 17, 2, p. 169-187 19 p.

Research output: Contribution to journalArticle

3 Scopus citations

Using social network analysis to identify key hackers for keylogging tools in hacker forums

Samtani, S. & Chen, H., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 319-321 3 p. 7745500

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations