John Hale
Orcid: 0000-0002-5956-8093
According to our database1,
John Hale
authored at least 84 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
2023
Transformation vs Tradition: Artificial General Intelligence (AGI) for Arts and Humanities.
CoRR, 2023
2022
2020
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020
2019
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019
Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (learning), 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Processing MWEs: Neurocognitive Bases of Verbal MWEs and Lexical Cohesiveness within MWEs.
Proceedings of the Joint Workshop on Linguistic Annotation, 2018
LSTMs Can Learn Syntax-Sensitive Dependencies Well, But Modeling Structure Makes Them Better.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018
2017
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
2015
Proceedings of the 2015 IEEE International Conference on Web Services, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
Proceedings of the Medical Data Privacy Handbook, 2015
2014
Proceedings of the Cyber and Information Security Research Conference, 2014
Proceedings of the Cyber and Information Security Research Conference, 2014
2013
Proceedings of the Cyber Security and Information Intelligence, 2013
2012
Security Risks Associated with Radio Frequency Identification in Medical Environments.
J. Medical Syst., 2012
Int. J. Comput. Model. Algorithms Medicine, 2012
Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
Proceedings of the Formal Grammar, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Toward sensitive information redaction in a collaborative, multilevel security environment.
Proceedings of the 6th International Symposium on Wikis and Open Collaboration, 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010
2009
Proceedings of the 11th International Workshop on Parsing Technologies (IWPT-2009), 2009
Toward Robust and Extensible Automatic Protocol Identification.
Proceedings of the 2009 International Conference on Internet Computing, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus.
Proceedings of the Bioinformatics and Computational Biology, 2009
2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
2007
Proceedings of the Advances in Digital Forensics III, 2007
2006
Proceedings of the Fifth International Conference on Language Resources and Evaluation, 2006
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
Proceedings of the ACL 2006, 2006
2005
2004
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004
2003
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
2002
Implementation and Verification of Programmable Security.
Proceedings of the Research Directions in Data and Applications Security, 2002
On Modeling Computer Networks for Vulnerability Analysis.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Proceedings of the Language Technologies 2001: The Second Meeting of the North American Chapter of the Association for Computational Linguistics, 2001
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001
Public Telephone Network Vulnerabilities.
Proceedings of the Database and Application Security XV, 2001
2000
J. Comput. Secur., 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
Programmable Security for Object-Oriented Systems.
Proceedings of the Database Security XII: Status and Prospects, 1998
Proceedings of the Sixth Workshop on Very Large Corpora, 1998
1997
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Capability-Based Primitives for Access Control in Object-Oriented Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
A Framework for High Assurance Security of Distributed Objects.
Proceedings of the Database Security Volume X, 1996
1995
A Tool for Inference Detection and Knowledge Discovery in Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994
A Practical Formalism for Imprecise Inference Control.
Proceedings of the Database Security, 1994
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994