Get my own profile
Public access
View all9 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Leslie M. BlahaAir Force Research LaboratoryVerified email at us.af.mil
Dustin ArendtPacific Northwest National LaboratoryVerified email at pnnl.gov
Catherine PlaisantResearch Scientist Emerita, University of MarylandVerified email at cs.umd.edu
Ben ShneidermanProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Alex EndertAssociate Professor, Georgia TechVerified email at gatech.edu
Emily WallEmory UniversityVerified email at emory.edu
Frank L. Greitzer, PhDFounder/Chief Scientist, PsyberAnalytixVerified email at PsyberAnalytix.com
Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
William A PikePacific Northwest National LaboratoryVerified email at lightnerpike.com
jean scholtzPacific Northwest National LaboratoryVerified email at mindspring.com
R. Jordan CrouserSmith CollegeVerified email at smith.edu
Antonio SanfilippoChief Scientist, Qatar Environment & Energy Research InstituteVerified email at hbku.edu.qa
Mi FengTwitterVerified email at twitter.com
Michelle DowlingGrand Valley State UniversityVerified email at gvsu.edu
Rick RienscheSenior Software Engineer, Autodesk Construction SolutionsVerified email at autodesk.com
Deb FrinckeAssociate Laboratory Director Oak Ridge National Laboratory, head of National Security SciencesVerified email at ornl.gov
Thomas EdgarCyber Security Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Aritra DasguptaAssistant Professor, New Jersey Institute of TechnologyVerified email at njit.edu
"Pak Chung Wong"Chief Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Nathan HodasBungieVerified email at bungie.com