Get my own profile
Public access
View all10 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Leslie M. BlahaAir Force Research LaboratoryVerified email at us.af.mil
Dustin ArendtPacific Northwest National LaboratoryVerified email at pnnl.gov
Catherine PlaisantResearch Scientist Emerita, University of MarylandVerified email at cs.umd.edu
Ben ShneidermanProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Alex EndertAssociate Professor, Georgia TechVerified email at gatech.edu
Frank L. Greitzer, PhDFounder/Chief Scientist, PsyberAnalytixVerified email at PsyberAnalytix.com
jean scholtzPacific Northwest National LaboratoryVerified email at mindspring.com
Emily WallEmory UniversityVerified email at emory.edu
Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
William A PikePacific Northwest National LaboratoryVerified email at lightnerpike.com
R. Jordan CrouserSmith CollegeVerified email at smith.edu
Mi FengAdobeVerified email at adobe.com
Michelle DowlingPacific Northwest National LabVerified email at pnnl.gov
Antonio SanfilippoChief Scientist, Qatar Environment & Energy Research InstituteVerified email at hbku.edu.qa
Deb FrinckeAssociate Laboratory Director Sandia National Laboratories, head of National Security ProgramsVerified email at sandia.gov
Thomas EdgarCyber Security Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Rick RienscheSenior Software Engineer, Autodesk Construction SolutionsVerified email at autodesk.com
Aritra DasguptaAssistant Professor, Department of Data Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
"Pak Chung Wong"Chief Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Nathan HodasBungieVerified email at bungie.com