Get my own profile
Public access
View all10 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Leslie M. BlahaAir Force Research LaboratoryVerified email at us.af.mil
Dustin ArendtPacific Northwest National LaboratoryVerified email at pnnl.gov
Alex EndertAssociate Professor, Georgia TechVerified email at gatech.edu
jean scholtzPacific Northwest National LaboratoryVerified email at mindspring.com
Frank L. Greitzer, PhDFounder/Chief Scientist, PsyberAnalytixVerified email at PsyberAnalytix.com
Catherine PlaisantResearch Scientist Emerita, University of MarylandVerified email at cs.umd.edu
Ben ShneidermanProfessor Emeritus Computer Science, University of MarylandVerified email at cs.umd.edu
Emily WallEmory UniversityVerified email at emory.edu
Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
William A PikePacific Northwest National LaboratoryVerified email at lightnerpike.com
Aritra DasguptaAssistant Professor, Department of Data Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
Mi FengAdobeVerified email at adobe.com
Michelle DowlingPacific Northwest National LabVerified email at pnnl.gov
R. Jordan CrouserSmith CollegeVerified email at smith.edu
Antonio SanfilippoChief Scientist, Qatar Environment & Energy Research InstituteVerified email at hbku.edu.qa
Deb FrinckeAssociate Laboratory Director Sandia National Laboratories, head of National Security ProgramsVerified email at sandia.gov
Thomas EdgarCyber Security Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
"Pak Chung Wong"Chief Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Rick RienscheSenior Software Engineer, LaunchDarklyVerified email at launchdarkly.com
Katya Le BlancIdaho National LaboratoryVerified email at inl.gov