Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Leysia PalenDistinguished Professor of Computer Science and Information Science, University of Colorado BoulderVerified email at colorado.edu
Sarah ViewegResearcher at EvenUp LawVerified email at evenuplaw.com
Kate StarbirdProfessor, Human Centered Design & Engineering, University of WashingtonVerified email at uw.edu
Jeannette SuttonUniversity at Albany, SUNYVerified email at albany.edu
Lise Ann St DenisUniversity of Colorado at BoulderVerified email at colorado.edu
Apoorva Chauhan, Ph.D.Assistant Professor, Information TechnologyVerified email at concordia.ab.ca
Christian ReuterScience and Technology for Peace and Security (PEASEC), TU DarmstadtVerified email at peasec.tu-darmstadt.de
Steve PetersonCertified Emergency ManagerVerified email at nih.gov
Keri Stephens or Keri K. Stephens or K...The University of Texas at Austin, ProfessorVerified email at austin.utexas.edu
Kenneth M. AndersonUniversity of ColoradoVerified email at cs.colorado.edu
Hemant PurohitAssociate Professor, School of Computing, George Mason UniversityVerified email at gmu.edu
Andrea Hoplight TapiaPenn State UniversityVerified email at ist.psu.edu
Marc-André KaufholdKnowledge Engineering (KE), Science and Technology for Peace and Security (PEASEC), TU DarmstadtVerified email at peasec.tu-darmstadt.de
Muhammad ImranSenior Scientist, Qatar Computing Research Institute, Hamad Bin Khalifa UniversityVerified email at hbku.edu.qa
Murray TuroffNew Jersey Institute of TechnologyVerified email at njit.edu
Robert PowerCSIROVerified email at csiro.au
Derek L. HansenProfessor of Electrical & Computer Engineering, Brigham Young UniversityVerified email at byu.edu
Nicolas LaloneRochester Institute of TechnologyVerified email at rit.edu
Peter D. HoweProfessor of Geography, Department of Environment & Society, Utah State UniversityVerified email at usu.edu
Yasas SenarathGeorge Mason UniversityVerified email at gmu.edu
Follow