university of tulsa logo

John Hale, PhD

John Hale, PhD
Tandy Professor of Bioinformatics and Computational Biology
College of Engineering & Natural Sciences
Computer Science
918-631-2745 Rayzor Hall Room 2150


PhD – The University of Tulsa MS – The University of Tulsa BS – The University of Tulsa


John Hale is a founding member of the TU Institute of Bioinformatics and Computational Biology (IBCB), and a faculty research scholar in the Institute for Information Security  (iSec).  His research has been funded by the US Air Force, the National Science Foundation (NSF), the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the National Institute of Justice (NIJ).  These projects include research in the fields of information assurance and bioinformatics.  He has testified before Congress on three separate occasions as an information security expert, and in 2004 was awarded a patent on technology he co-developed to thwart digital piracy on file sharing networks.  In 2000, Hale earned a prestigious NSF CAREER award for his educational and research contributions to the field of information assurance.

Research Interests

Computational Biology
Medical Informatics
Information Security
High-performance Computing
Formal Methods
Digital Humanities
Social Computing

Teaching Interests

Computer Architecture
Information Security
High-performance Computing
Computational Biology
Medical Informatics
Enterprise Computing


  • Atluri, Vijay, and John Hale. Research Advances in Database and Information Systems Security: IFIP TC11 WG11. 3 Thirteenth Working Conference on Database Security July 25–28, 1999, Seattle, Washington, USA. Vol. 43. Springer, 2013. Print.

  • G. Louthan, J. Daily, J. Hale, M. Papa, and P. Hawrylak, “Attack Graphs and Scenario Driven Wireless Computer Network Defense,” to appear in Situational Awareness in Computer Network Defense: Principles, Methods and Applications, IGI Global, Hershey, PA, 2011.

  • J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

  • Kong, Liang, Gavin Bauer, and John Hale. “Location-Based Device Grouping for Function Restriction.” Proceedings of the 9th Annual Cyber and Information Security Research Conference. 2014. 113–116. Print.

  • Chris Reynolds, Charles Bales, Will Nichols, Casey Strong, John Hale, Mauricio Papa, Peter J. Hawrylak, “Cyber-Security Experimentation Platform for Instrumentation and Control Systems in a Nuclear Reactor,” Advances in Nuclear Nonproliferation Technology & Policy Conference, Sept. 25-30, 2016, Santa Fe, NM, US., 4 pages.

  • Schimke, Nakeisha, and John Hale. “Neuroimage Data Sets: Rethinking Privacy Policies.” Proceedings of the 3rd USENIX conference on Health Security and Privacy, USENIX Association (2012): 301–308. Print.

  • *Staggs, J., *Beyer, R., *Mol, M., *Fisher, M., Brummel, B., & Hale, J. (2014). A perceptual taxonomy of contextual cues for cyber trust. Proceeding of the Colloquium for Information System Security Education (CISSE), 2, 152-169.

  • Kong, Liang, Gavin Bauer, and John Hale. “Robust Wireless Signal Indoor Localization.” Concurrency and Computation: Practice and Experience 27.11 (2015): 2839–2850. Print.

  • Hale, John, Maurico Papa, and David Greer. Security Engineering and Educational Initiatives for Critical Information Infrastructures. TULSA UNIV OK, 2013. Print.

Courses Taught

  • System Security and Cryptography
  • Computer Architecture, Organization and Assembler
  • High Performance Computing
  • Independent Study
  • Research and Thesis

Awards & Honors

  • Kermit E. Brown Award for Teaching Excellence
  • Zelemir Schmidt Research Award
  • Teaching Excellence Award