Some men see things as they are, and ask why. I dream of things that never were and ask why not.  - Robert Kennedy

Dr. Guillermo Francia III

Dr. Guillermo A. Francia, III joined the University of West Florida Center for Cybersecurity in 2018. Previously, Dr. Francia served as the Director of the Center for Information Security and Assurance and held a Distinguished Professor position at Jacksonville State University. Dr. Francia is a recipient of numerous cybersecurity research and curriculum development grants. His projects have been funded by prestigious institutions such as the National Science Foundation, Eisenhower Foundation, Department of Education, Department of Defense and Microsoft Corporation. In 1996, Dr. Francia received one of the five national awards for Innovators in Higher Education from Microsoft Corporation. He served as a Fulbright scholar to Malta in 2007 and a US-UK Fulbright Cybersecurity research scholar to Imperial College London in the United Kingdom in 2017. Dr. Francia is the recipient of the 2018 National CyberWatch Center Innovations in Cyber Security Education — Faculty Development Category Award.

Extended Bio

 

Education

Ph.D., Computer Science
New Mexico Tech

M.S., Computer Science
New Mexico Tech

B.S., Mechanical Engineering
Mapua Institute of Technology

 

Awards

2018 National CyberWatch Center Innovations in Cyber Security Education Award--Faculty Development Category

2016-2017 US-UK Fulbright Cyber Security Research Award, US Department of State and The UK Fulbright Commission

2014 Faculty Scholar Lecturer Award, JSU

2009 Ray and Ruth Ringer Award, JSU

2008 Earlon and Betty McWhorther Outstanding Teacher Award, JSU

2006-2007 Fulbright Scholarship Lecture Award to Malta

2004 College of Arts and Sciences Distinguished Research Award

2002 College of Arts and Sciences Distinguished Teacher Award

1997 Balik-Scientist (Returning Scientist) Program Award, Department of Science and Technology (DOST), Republic of the Philippines

1996 Innovation in Higher Education Award. Microsoft Corporation.

1991 Richard Matuzeski Research Award, New Mexico Tech

1990 Computer Science Patrick Orr Memorial Award, New Mexico Tech

 

Some men see things as they are, and ask why. I dream of things that never were and ask why not.  - Robert Kennedy

Research

Dr. Francia's research interests include Vehicle Security, Industrial Control Systems/SCADA security, Radio Frequency (RF) security, Renewable Energy and Microgrid security, Compliance and Auditing, Applied Machine Learning, Blockchain Technology, and Embedded System security. 

Grants and Projects

  • Analyzing and Securing Vehicular Control and Embedded Devices. ($73,650). Funded by the Cyber Florida Collaborative Seed Program. (July 1, 2019-June 30, 2020).

  • Vehicular Control & Embedded Systems Security: Outreach to DoD.($149,351). Funded by the Department of Defense (DoD). (September 01, 2019-August 30, 2020).

  • Design and Implementation of an Energy Cyber-Physical System Laboratory Testbed. ($101,256). Funded by the UWF-Instructional Technology Enhancement Project (ITEP). (May 01, 2019- April 30, 2021).

  • NSA-DHS CAE UWF Regional Resource Center for the Southeastern Region. ($123,166). Funded by the NSA. (April 01, 2019-September 30, 2020).

  • Cybersecurity Workforce Education-CNAP Initiatives Grant ($119,021). Funded by the National Security Agency (NSA) with grant award #H98230-17-1-0326. (September, 2017-August 2018)

  • JSU GenCyber Teacher Camp for Cyber Security Project. ($99,529). Funded by the National Security Agency (NSA) and the National Science Foundation (NSF) with grant award #H98230-17-1-0164. (April, 2017-March, 2018)

  • JSU GenCyber Teacher Camp for Cyber Security Project. ($98,780). Funded by the National Security Agency (NSA) and the National Science Foundation (NSF) with grant award #H98230-16-1-0168. (April 28, 2016-April 27, 2017)

  • Capacity Building for Control Systems Security Collaborative Project. ($229,296).  Funded by the National Science Foundation (NSF) under the Scholarship for Service (SFS) Capacity Building Program grant award #1515636. (September 2015-August 2018)

  • Real-time Continuous Security Monitoring of Industrial Control Systems Through Intelligent Data Aggregation, Visualization, and Analytics Project($134,943). (funded by the Department of Defense-National Security Agency (DoD-NSA) CAE Cybersecurity Research Program ). (September 01, 2015-August 30, 2016)

  • DoD-NSA Information Assurance Scholarship Program ($33,653). (funded by the Department of Defense-National Security Agency Information Assurance Scholarship Program ). (September 2013-August 30, 2014)

  • DoD-NSA Capacity Building Grant-Outreach to Academia Program ($50,308). (funded by the Department of Defense-National Security Agency Information Assurance Scholarship Program ). (October 2012-December 2013)

  • Community Resilience Project--Community & Regional Resilience Institute (CARRI)($329,485). (funded by the Southeast Regional Research Initiative (SERRI) and Oak Ridge National Laboratory (ORNL) ). (Sept 2010-August 2011)

  • DoD-NSA Capacity Building Grant and Information Assurance Scholarship Program ($77,978). (funded by the Department of Defense-National Security Agency Information Assurance Scholarship Program ). (Sept 2010-December 2011)

  • "MRI-R2:Acquisition for the Critical Infrastructure Security and Assessment Laboratory (CISAL)" Project. ($415,600). (funded by the National Science Foundation (NSF) under the Office of CyberInfrastructure (OCI) grant award #0959687). (May 2010-April 2013)

  • Enhanced Mathematics, Computer, and Engineering Technology Scholarship II (EMCETS II) Project ($500,000). (funded by the National Science Foundation (NSF) under DUE grant award #0726486). (January, 2008-December, 2013)

  • Fulbright Scholarship Lecture Award to Malta . (funded by the Council for International Exchange of Scholars (CIES) (January-June,2007).

  • Digital Forensic Toolkit (DFT) and Automated Compliance Verification Toolkit (ACVT). ($2,065). (funded by the JSU Faculty Research Committee, 2006-2007).

  • Collaborative Learning System Tools ($2,000). (funded by the Academic Center for Excellence through a Department of Education Title III grant).

  • Enhanced Mathematics, Computer, and Engineering Technology Scholarship Project ($400,000). (funded by the National Science Foundation (NSF) under DUE grant award #0122767).

  • Integration of Wireless Technologies into an Undergraduate Networks Exploration Laboratory ($59,500). (funded by the National Science Foundation (NSF) under grant award #0125635).

  • Versatile Networks Laboratory (VeNeLa) Project ($37,500). (funded by the National Science Foundation (NSF) under grant award #9950946).

  • Web Enabled Automatic Test Generation and Management System (WEATGAMS) ($2000). (funded by the Department of Education (DOE) under the Title III grant award on Academic Center for Excellence).

  • Web Enabled Basic Knowledge Accessibility Project (WEBKAP) ($2000). (funded by the Department of Education (DOE) under the Title III grant award on Academic Center for Excellence).

  • Automated and Intelligent Academic Advising System ($5,000) (funded by Microsoft Corp).

  • Corrosion Instrument Microcontroller (MCS-51) Software Engineering Project (funded by Metal Samples Co./Alabama Research and Development).

 

Publications

Google Scholar

Books

Book Chapters

  • "Auditor Evaluation and Reporting on Cybersecurity Risks." (With J.S. Zanzig)  In Mehdi Khosrow-Pour (Ed) , Encyclopedia of Organizational Knowledge, Administration, and Technologies.(2020) Hershey, PA: IGI-Global Publishing. www.igi-global.com. (To appear).

  • "Laboratory Exercises to Accompany Industrial Control and Embedded Systems Security Curriculum Modules." (With J. Snellen and G. Richards). In Y. Maleh, et al. (Eds) Cybersecurity and Privacy in Cyber Physical Systems (2019): 185. Taylor & Francis Group, CRC Press.

  • "Practical Guidance in Achieving Successful Change Management in Information System Environment." (With J.S. Zanzig and X.P. Francia). In Rosado da Cruz, A. M. and Ferreira da Cruz, M. E. (Eds.), New Perspectives on Information Systems Modeling and Design.(2019):41. Pp. 41-66. Hershey, PA: IGI-Global Publishing. www.igi-global.com.

  • "A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems," (With J. Kim). In K. Daimi, et al. (Eds.) Computer and Network Security Essentials (pp. 521-538). Springer International Publishing AG. ISBN 978-3-319-58423-2. 2018. http://www.springer.com/us/book/9783319584232#aboutAuthors.

  • "Privacy, Security, and Identity Theft Protection: Advances and Trends," (With F. S. Hutchinson and X. P. Francia). In Manish Gupta. (Ed.), Handbook of Research on Emerging Developments in Data Privacy. (pp. 133-143). Hershey, PA: IGI Global. doi: 10.4018/978-1-4666-7381-6.ch007. 2015.

  • "Critical Infrastructure Protection and Security Benchmarks," (With X. P. Francia). In Khosrow-Pour, M. (Ed.), Encyclopedia of Information Science and Technology, Third Edition (10 Volumes) (pp. 4267-4278). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-5888-2. July, 2014.

  • "Internal Control Considerations for Information System Changes and Patches," (with J.S. Zanzig and X.P. Francia). In H. Rahman and R. de Sousa (Eds.), Information Systems and Technology for Organizational Agility, Intelligence, and Resilience (pp. 161-179). Hershey, PA: Business Science Reference. doi:10.4018/978-1-4666-5970-4.ch008. April, 2014

  • "Gamification of Information Security Awareness Training," (with D. Thornton, M. Trifas, and T. Bowden). In Babak Akhgar and Hamid Arabnia (Eds), Emerging Trends in ICT Security. Elsevier, Inc., Waltham, MA, pp. 85-97, 2014.

  • "Regulatory and Policy Compliance with Regard to Identity Theft Prevention,Detection, and Response," (with Frances Hutchinson). In Te-Shun Chou (Ed), Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances. IGI Global Publishing, pp. 292-322, 2012.

  • "Multimedia Information Security and Privacy--Theory and Applications," (with Ming Yang,Monica Trifas, Lei Chen, and Yongliang Hu). In Dr. Hamid Nemati (Ed), Security and Privacy Assurance in Advancing Technologies: New Developments. IGI Global Publishing, 2011.

  • "Security Compliance Auditing: Review and Research Directions," (with J. Zanzig). In M. E. Whitman & H. J. Mattord (Eds.), Readings and Cases in the Management of Information Security, Volume II: Legal and Ethical Issues in Information Security Management. Course Technology. 2011.

  • "Global Information Security Regulations, Case Studies and Cultural Issues," (with A. Ciganek). In M. E. Whitman & H. J. Mattord (Eds.), Readings and Cases in the Management of Information Security, Volume II: Legal and Ethical Issues in Information Security Management. Course Technology. 2011.

Journal Papers

  • "Performance Evaluation of Modbus TCP in Normal Operation and Under a Distributed Denial of Service Attack," (with Gamess, Eric, and Smith, Brody) International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.2, March 2020. Available at: http://aircconline.com/ijcnc/V12N2/12220cnc01.pdf. DOI: 10.5121/ijcnc.2020.12201

  • "Pedagogical Resources for Industrial Control Systems Security: Design, Implementation, Conveyance, and Evaluation," (with Randall, Greg and Snellen, Jay) Journal of Cybersecurity Education, Research and Practice: Vol. 2017 : No. 1 , Article 2. Available at: http://digitalcommons.kennesaw.edu/jcerp/vol2017/iss1/2

  • "Towards an In-depth Understanding of Deep Packet Inspection Using a Suite of Industrial Control Systems Protocol Packets," (with Francia, Xavier P. and Pruitt, Anthony M.) Journal of Cybersecurity Education, Research and Practice: Vol. 2016 : No. 2 , Article 2. Available at: http://digitalcommons.kennesaw.edu/jcerp/vol2016/iss2/2

  • "A Consensus of Thought in Applying Change Management to Information System Environments," (with J.S. Zanzig and X.P. Francia). International Journal of Information Systems Modeling and Design (IJISMD). Vol.6, Issue 4, pp. 25-41, October-December 2015, ISSN: 1947-8186; EISSN: 1947-8194.

  • "Embedded and Control Systems Security Projects," (With J. Snellen) Information Security Education Journal. Vol. 1, no. 2, pp. 77-84. December, 2014.

  • "Gamification of Information Systems and Security Training: Issues and Case Studies," (With D. Thornton) Information Security Education Journal. Vol. 1, no. 1, pp. 16-29. March, 2014.

  • "A Formal Framework for Patch Management," (With K. Kim, B. Ahn and S. Zhou) International Journal of Interdisciplinary Telecommunications and Networking. Vol. 5, no. 2, pp. 18-31. April-June, 2013.

  • "Portable SCADA Security Toolkits," (With N. Bekhouche, T. Marbut, and C. Neuman) International Journal of Information and Network Security. Vol. 1, no. 4, pp. 265-274. October, 2012.

  • "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy," (With M. Yang, M. Trifas, and L. Chen) International Journal of Information Security and Privacy. Vol. 3, no. 3, pp. 37-54. July-September, 2009.

  • "The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise, " (with B Estes, R. Francia, V. Nguyen, and A. Scroggins). Journal of Digital Forensics, Security and Law.(Vol 2, no. 4, January, 2008).

  • "An Empirical Study on the Performance of Java/.Net Cryptographic APIs." (with Rahjima R Francia). Information Security Journal: A Global Perspective. (Vol 16:No. 6, November, 2007): 344-354.

  • "A Tale of Two Learning Objects," Journal of Educational Technology Systems, (Vol 3, No. 2, 2002-2003):177-190.

  • "Derivation and Visualization of the Binomial Theorem." International Journal of Computers for Mathematical Learning, Vol 5: 3--24(2000).

  • "The Intelligent Academic Advising System: A Case of Client/Server Computing in Education," Journal of Educational Technology Systems. (Vol 25, No.3, Spring 1997)

Conference Papers

  • "Integrating Blockchain Technology in Healthcare via Active Learning," (with B. Bornelus and H. Chi).Proceedings of the 2020 ACM Southeast Conference (ACMSE 2020). April 2-4, 2020. Tampa, FL.  Pp. 122-126. ISBN: 978-1-4503-7105-6.

  • "Connected Vehicle Security," Proceedings of the 15th International Conference on Cyber Warfare and Security (ICCWS 2020). March 12-13, 2020. Norfolk, VA. Pp. 173-181. DOI: 10.34190/ICCWS.20.128.

  • "A Scenario-based Learning Approach to Industrial Control Systems Security Training," Proceedings of the 2018 International Conference on Security and Management (SAM'18). Las Vegas, NV, July  30-August 02, 2018.Pp. 111-116.

  • "A Machine Learning Test Data Set for Continuous Security Monitoring of Industrial Control Systems," Proceedings of the 2017 IEEE CYBER Conference, July 31-August 4, 2017, Honolulu, HI.

  • "A Stochastic Model of an Industrial Control System Kill Chain," (with T. Li and C. Feng). Proceedings of the 9th Annual National Cyber Summit. June 6-8, 2017. Von Braun Center, Huntsville, AL. URL: https://cdm16608.contentdm.oclc.org/digital/collection/p16608coll30/id/112/rec/1.

  • "Pedagogical resources for Industrial Control Systems Security: Design, Implementation, Conveyance, and Evaluation," (with G. Randall and J. Snellen). Proceedings  of the 2016 Conference on Cybersecurity Education, Research and Practice, October, 2016.

  • "Towards an In-depth Understanding of Deep Packet Inspection Using a Suite of Industrial Control Systems Protocol Packets," (with X. P. Francia and A. M. Pruitt). Proceedings  of the 2016 Conference on Cybersecurity Education, Research and Practice, October, 2016.

  • "Baseline Operational Security Metrics for Industrial Control Systems." Proceedings of the 2016 International Conference on Security and Management, Las Vegas, NV, July, 2016. pp. 8-14.

  • "A Machine Learning Approach to Continuous Security Monitoring of Industrial Control Systems,"  (with Jaedeok Kim and Xavier P. Francia). Proceedings of the 2016 International Conference on Embedded Systems, Cyber-Physical Systems and Applications (ESCS2016), Las Vegas, NV, July, 2016. pp. 95-101.

  • "Social and Behavioral Modeling for a Trustworthy Cyberspace: A research Framework, "(with T. L. McKerchar). Proceedings of the International Symposium of Psychology and Behavior in China's Social Transformation under the Background of Informatization, The American Scholars Press, Jiaxing, Zhejiang, China, September 18-20, 2015.

  • "Learning Cloud Computing and Cloud Security by Simulation, "(with C. Lo, K. Qian, M. Yang, and X. Hu). Proceedings of the 2013 IASTED International Conference on Technology for Education and Learning (TEL 2013), ACTA Press. Marina Del Rey, CA, November 11-13, 2013.

  • "Dissecting Industrial Control Systems Protocol for Deep Packet Inspection, "(with X. Francia). Proceedings of the 17th Annual Colloquium for Information Systems Security Education (CISSE), Mobile, AL, June 10-13, 2013.

  • " Enhance Computer Networks Learning with Hands-on Mobile Device Labware, "(with M. Yang, K. Qian, M. Guo, P. Bhattacharya, L. Yang). Proceedings of the ACM Technical Symposium on Computer Science Education (SIGCSE), Denver, CO, March 2013. pp. 508-514.

  • " Virtualization for a Cyber-Security Laboratory, "(with A. Garrett and T. Brookshire). Proceedings of the Frontiers of Education in Computer Engineering and Science Conference 2012, Las Vegas, NV, July, 2012. pp. 508-514.

  • " Security Best Practices and Risk Assessment of SCADA and Industrial Control Systems," (with D. Thornton and J. Dawson). Proceedings of the Security and Management 2012 Conference, Las Vegas, NV, July, 2012. pp. 352-358.

  • " Cyberattacks on SCADA Systems" (with D. Thornton and T. Brookshire). Proceedings of the 2012 Colloquium for Information Systems Security Education (CISSE), Orlando, FL, June, 2012. Best paper in conference.

  • " Critical Infrastructure Curriculum Modules," Proceedings of the 2011 Information Security Curriculum Development (INFOSECCD) Conference. Kennesaw, GA. October, 2011.

  • " The Joint Academic Program Between Jacksonville State University and Taizhou University: From Inception to Implementation," (with M. Trifas and M. Yang). Proceedings of the 4th International Symposium on Academic Globalization: AG2011. Orlando, FL. July, 2011.

  • " DNA Sequence Visualization and Feature Extraction," (with M. Trifas, C. Murdock, C. Mann, Q, Mayo, and A. Wiggins). Proceedings of the 5th International Symposium on Bio and Medical Informatics and Cybernetics: BMIC 2011. Orlando, FL. July 2011.

  • " Jacksonville State's Gamecocks Going Global," (with M. Trifas and M. Yang). Proceedings of the 3rd International Symposium on Academic Globalization: AG2010. Orlando, FL. June, 2010.

  • " Design and Implementation of a Critical Infrastructure Security and Assessment Laboratory," (with N. Bekhouche and T. Marbut). Proceedings of the Security and Management 2011 Conference, Las Vegas, NV, July, 2011.

  • " Security Metrics-Review and Research Directions," (with S. Jarupathim). Proceedings of the Security and Management 2009 Conference, Las Vegas, NV, July, 2009. pp. 441-446.

  • " Applied Data Mining in a Scholarship Program, "(with C. Sanders). Proceedings of the Frontiers of Education in Computer Engineering and Science Conference 2009, Las Vegas, NV, July, 2009. pp. 336-340.

  • "A Model for Section 404 Compliance using Fuzzy Logic Processing," (with J. Zanzig (JSU) and D. Flesher (Univ of Miss)) Proceedings of the 2009 Southeast Region American Accounting Association Meeting. University, MS, USA, April 30-May 2, 2009.

  • "The Impact of Culture on Global Information Security Regulations," (with A. Ciganek) Proceedings of the Southern Association for Information Systems Conference. Charleston, SC, USA, March 12-14, 2009.

  • "Visual Security Monitoring Gadgets," Proceedings of the Information Security Curriculum Development (InfoSecCD) 2008 Conference:40-43, 2008.

  • "Digital Forensics Laboratory Projects," The Journal of Computing in Small Colleges,(Vol 21, No. 5, May 2006):38-45. Proceedings of the 4th Annual CCSC-MS Conference.

  • "Wireless Networks Laboratory Projects," The Journal of Computing in Small Colleges,(Vol 20, No. 2, December 2004):233-239. Proceedings of the 18th Annual CCSC Southeastern Conference.

  • "An Efficient Packet Loss Recovery Methodology for Video-over-IP." (with with M Yang, N Bourbakis, and Z Chen) Proceeding of the 9th IASTED International Conference on Signal and Image Processing (SIP2007), Honolulu, Hawaii, USA, August 20-22, 2007.

  • "Forensic Data Visualization System: Improving Security through Automation," (with with M Trifas, D Brown, R Francia, and C Scott) Proceeding of the Computer Security Conference, Myrtle Beach, SC, USA, April 12-13, 2007.

  • "Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing," (with with Z Chen, M Yang, and J Dongarra) Proceeding of the 21st IEEE International Parallel & Distributed Processing Symposium, DPDNS'07 Workshop, Long Beach, CA, USA, March 26-29, 2007. IEEE Computer Society Press.

  • "Steganography Obliterator: An Attack on the Least Significant Bits," (with T. Gomez) Proceedings of the Information Security Curriculum Development(InfoSecCD) 2006 Conference:102-108.

  • "Visualization and Management of Digital Forensic Data," (with A. Trifas, D. Brown, R. Francia, and C. Scott) Proceedings of the Information Security Curriculum Development(InfoSecCD) 2006 Conference:115-120.

  • "Wireless Security Tools,"(with P. Le and A. Kilaru) Proceedings of the 2005 International Conference on Wireless Networks (ICWN'05):562-568. CSREA Press. 2005

  • "Computer Forensic Tools and Techniques," (with K. Clinton) Proceedings of the 2005 International Conference on Security and Management (SAM'05):248-252. CSREA Press. 2005

  • "Computer Forensics Laboratory and Tools," (with K. Clinton). Proceedings of the 3rd Annual CCSC MidSouth Conference. April 1-2, 2005.The Journal of Computing Sciences in Colleges (Vol 20:No.6): 143-150.

  • "The Design and Analysis of a Dynamic Hybrid Ad-hoc Wireless Routing Algorithm," (with M. Vashi, A. Kilaru, and P. Le) Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004). (Vol III Communication and Network Systems, Technologies and Applications):264-269.Orlando, FL. July 18-21,2004.

  • "Computer Networking Laboratory Projects," (with C. Chao) The Journal of Computing in Small Colleges,(Vol 19, No.3, January 2004):226-237.

  • "An Intelligent RFID Based Wireless Tools and Asset Tracking System," Proceedings of the 2004 International Conference on Wireless Networks (ICWN'04). (Vol II):651-657. CSREA Press. 2004

  • "Network Performance Measurement Tools," (with A. Kilaru, M. Vashi, and P. Le) Proceedings of the 2004 International Conference on Communications in Computing (CIC'04):25-30. CSREA Press. 2004

  • "An Empirical Study of Bluetooth Performance," (with A. Kilaru, M. Vashi, and P. Le) Proceedings of the 2nd Annual Mid-South College Computing Conference (MSCCC 2004):81-93.

  • "A Performance Comparison of Encryption Algorithms," (with A. Kilaru, M. Vashi, and P. Le) Proceedings of the 2003 International Conference on Security and Management (SAM'03). (Vol II):644-649. CSREA Press. 2003

  • "A Wireless Sensor Network," Proceedings of the 2003 International Conference on Wireless Networks (ICWN'03):306-312. CSREA Press. 2003

  • "The Design and Implementation of a Wireless Maintenance Identification System," (with G. Greenwood) Proceedings of the 2003 International Conference on Wireless Networks (ICWN'03):160-165. CSREA Press.

  • "Experiential Learning Through a Heterogeneous Computer Networking Laboratory," (with R. Smith) Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics (Vol IV Mobile/Wireless Computing and Communication Systems I):325-330. Orlando, FL. July 14-18,2002. Best paper in session.

  • "The Integration of Wireless Technologies in a Computer Networks Lab," (with R. Smith) The Journal of Computing in Small Colleges,(Vol 18, No. 2, December 2002):201-207. Proceedings of the 16th Annual CCSC Southeastern Conference.

  • "Embedded Systems Programming," The Journal of Computing in Small Colleges,(Vol 17, No. 2, December 2001):204-210. Proceedings of the 15th Annual CCSC Southeastern Conference.

  • "The Design and Implementation of a Heterogeneous Networking Laboratory," (with R. Smith), The Journal of Computing in Small Colleges,(Vol 16, No.2, January 2001):231-238. Proceedings of the 14th Annual CCSC Southeastern Conference.

  • "A Hybrid Computer Networks Course for IS and CS Majors," (with R. Smith), Proceedings of the ISECON 2000 Information Systems Education Conference. Philadelphia, PA (November, 2000):22.

  • "On the Cost Effective Delivery of Distance Learning," Journal of Computing in Small Colleges. (Vol 12, No.4, January 1998). Proceedings of the 11th Annual CCSC Southeastern Conference

  • "Test Data Generation From Parallel Logic Specifications," (with A. Sung) Proceedings of 5th New Mexico Computer Science Conference (April 1990), NMSU-TR-90-CS-04: 64--68.

  • "Structural Testing of Expert Systems," (with A. Sung) Proceedings of 6th IASTED Int'l Conference on Expert Systems and Neural Networks, Theory and Applications (August 1990): 119--122

  • "PARLOG as a Specification Language for Parallel Numerical Software," (with A. Sung) Proceedings of the 1990 ISMM Int'l Conference on Parallel and Distributed Computing, and System (October 1990): 95--96.

  • "Path Selection Testing Criteria for Expert Systems Software," Proceedings of the First Golden West Conf on Intelligent Systems, Reno, NV (June, 1991): 92--97.

  • "Testing Expert Systems Software," (with A. Sung) Proceedings of the 9th Pacific Northwest Conference on Software Quality, Portland, OR (October 1991): 324--340.

  • "On Testing Expert Systems: Criteria and Test Data Generation," (with A. Sung) Proceedings of the IV International Symposium on AI, Cancun, Mexico (November 1991): 478--484.

  • "An Approach to Testing Expert Systems," (with A. Sung) Proceedings of the First World Congress on Expert Systems, Orlando, FL (December 1991): Vol.2, pp.1013-1020.

  • "Towards Parallel Programming Through Intelligent Specifications," (with A. Sung) Proceedings of 6th IASTED Int'l Symposium on Expert Systems, Theory and Applications (December 1989): 56--59.

 

Community Leadership
  • Commissioner, Computing Accreditation Commission (CAC) ABET, Baltimore, MD. (2019-Present)

  • Regional Peer Reviewer. Fulbright program--Institute of International Education US Department of State. 2018.

  • Proposal Reviewer. NWO Joint U.S.-Netherlands Cyber Security Research Programme. (September-October, 2017)

  • Panel Reviewer. SaTC Program. National Science Foundation. Washington, D.C. (2014, 2018)

  • Evaluator for Program Accreditation. Computing Accreditation Commission (CAC) ABET. Baltimore, MD. (2013-Present)

  • Reviewer for Fulbright Grant Applications. Council of International Exchange of Scholars (CIES). Washington, D.C.(2008-2011)

  • Chair and Panel Reviewer. CCLI-Exploratory Phase I. National Science Foundation. Washington, D.C. (2008)

  • Certified AP Computer Science Course Syllabi Audit Reviewer. Educational Policy Improvement Center (EPIC) (2007)

  • Panel Reviewer. CCLI-Exploratory Phase I. National Science Foundation. Washington, D.C. (2006)

  • Panel Reviewer. CSEMS proposals. National Science Foundation. Washington, D.C. (2002, 2003, 2004)

  • Reader. AP Computer Science. Educational Testing Service. Clemson University (2002, 2003, 2004, 2005, 2006). Louisville, KY Expo (2008). Duke Convention, Cincinnati, OH (2009, 2010-2012, 2014)

  • Software Engineering Consultant. Embedded Systems projects and Automated Corrosion Data Collection and Analysis Systems projects. Alabama Specialty Products, Inc. (1996-present)

  • Visiting Scientist. Department of Science and Technology. Republic of the Philippines.(1997)

  • Software Engineering Consultant. Automated Shipping Label Generation System project. Prodesign Systems, Inc. (2001-present)

  • Training Consultant. Visual Basic Workshop. Westinghouse-Anniston. (1998)

  • Training Consultant. Unix Workshops. ITC Deltacom-Anniston. (2000-2001)