Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Leslie M. BlahaAir Force Research LaboratoryVerified email at us.af.mil
Dustin ArendtPacific Northwest National LaboratoryVerified email at pnnl.gov
Alex EndertAssociate Professor, Georgia TechVerified email at gatech.edu
Catherine PlaisantResearch Scientist Emerita, University of MarylandVerified email at cs.umd.edu
Ben ShneidermanProfessor Emeritus Computer Science, University of MarylandVerified email at cs.umd.edu
Frank L. Greitzer, PhDFounder/Chief Scientist, PsyberAnalytixVerified email at PsyberAnalytix.com
jean scholtzPacific Northwest National LaboratoryVerified email at mindspring.com
Emily WallEmory UniversityVerified email at emory.edu
Antonio SanfilippoChief Scientist, Qatar Environment & Energy Research InstituteVerified email at hbku.edu.qa
Aritra DasguptaAssistant Professor, Department of Data Science, New Jersey Institute of Technology (NJIT)Verified email at njit.edu
Daniel M. BestSr. Cyber Security Researcher, PNNLVerified email at pnnl.gov
William A PikePacific Northwest National LaboratoryVerified email at lightnerpike.com
Mi FengAdobeVerified email at adobe.com
Michelle DowlingPacific Northwest National LabVerified email at pnnl.gov
R. Jordan CrouserSmith CollegeVerified email at smith.edu
Deb FrinckeAssociate Laboratory Director Sandia National Laboratories, head of National Security ProgramsVerified email at sandia.gov
"Pak Chung Wong"Chief Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Thomas EdgarCyber Security Scientist, Pacific Northwest National LaboratoryVerified email at pnnl.gov
Rick RienscheSenior Software Engineer, LaunchDarklyVerified email at launchdarkly.com
Katya Le BlancIdaho National LaboratoryVerified email at inl.gov