Sunteți pe pagina 1din 25

March 2015

Mario A Garcia
Professor Department of Computing Sciences
Texas A&M University-Corpus Christi
Center for Instruction # 331
mario.garcia@tamucc.edu
6300 Ocean Dr. phone: (361) 825 3478
Corpus Christi, Texas 78412 fax: (361) 825-2795
Current Position: Professor

Academic Preparation
Postdoc - University of Maryland University College UMUC Information Assurance. 2006-2007
Certificate - Carnegie Mellon University- Information Assurance. Summer 2003
Certificate - Purdue University - Information Assurance. Summer 2004
Ph.D. Texas A&M University. Computer Science - Dissertation Title: "Intelligent Agents
Applied to Software Management" August 1997.
M.S. Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) - Computer
Science.: Dissertation Title: "Methodology to Diagnose Alarms Using a Real Time
Expert System" July 1991.
M.S. Instituto Tecnologico de la Laguna. - Electrical Engineering: Thesis Title: "Set
Theoretical Control" December 1980.
B.S. Instituto Tecnologico de Saltillo - Electrical Engineering: Thesis Title: "Using Sparse
Matrix for the Analysis of Electrical Circuits" June 1979
Professional Experience
2014 Visiting Scientist June – August. Lawrence Livermore National Laboratory
2013 Visiting Scientist June – August. Lawrence Livermore National Laboratory
2012 Visiting Scientist May – July Naval Undersea Warfare Center Newport RI
2011 Visiting Scientist July – August Naval Undersea Warfare Center Newport RI
Visiting Scientist - June Educational Testing Service (ETS) Princeton NJ.
2010 Visiting Scientist June – July University of California at Berkeley
2008 - Visiting Scientist Monterrey Tech. ITESM – Mexico June – August 208
2006 - Visiting Scientist Stanford University June – August 2006
2005 - Visiting Scientist CERT/SEI/CMU Carnegie Mellon University June – August
2009 - Adjunct Full-Professor – University of Maryland University College (online)
2009 - Professor Texas A&M University Corpus Christi – Computer Science
2004-2009: Associate Professor Texas A&M University Corpus Christi – Computer Science
1999-2004: Assistant Professor Texas A&M University Corpus Christi – Computer Science
1998-1999: Assistant Professor Instituto Tecnologico y de Estudios Superiores de Monterrey
1996-1997: Lecturer Texas A&M University Department of Computer Science
1994-1996: Research Assistant Texas A&M University Department of Computer Science
1993-1994: Research Assistant Texas A&M University Forest Science Department
1988-1991: Research Assistant Instituto Tecnologico y de Estudios Superiores de Monterrey
1979-1988: Professor National System of Technological Institutes.
1982-1983 Professor, Electrical Engineering, National University of Mexico (UNAM).
[Type text]

Administration
1987-1988 Professor and Sub-Director, Tecnologico de Saltillo, Saltillo Mexico.
1986- 1987 Professor and Sub-Director, Tecnologico de San Luis, San Luis Potosi Mexico
1983-1986 Professor and Sub-Director, Tecnologico de Piedras Negras, Piedras Negras
Coahuila Mexico
1982-1983 National Coordinator of Electrical Engineering. National System of Technological
Institutes, Mexico City.

Teaching
University of Maryland University College: INFA650 -9041
Graduate: Introduction to Computer Forensics August 2006 - Present
Texas A&M University Corpus Christi
Graduate: COSC 5311 Fundamentals in Programming and Problem Solving I; COSC 5312
Fundamentals in Programming and Problem Solving II; COSC 5320 Design and Implementation
of Computer Instructional Systems; COSC 5321 Data Structures; COSC 5325 Foundations of
Software Engineering; Advanced Software Engineering; COSC 5348 Expert Systems; COSC
5354 Artificial Intelligence; COSC 5374 Computer Forensics (course developed); COSC 5375
Information Security (course developed); COSC 5376 Network Security (course developed);
COSC 5377 Wireless Security (course developed); COSC 5378 Survivable Systems (course
developed); COSC 5379 Advanced Information Assurance (course developed). COSC 5590
Selected Topics: Wireless Security(course developed . Advanced Artificial Intelligence (course
developed) Ethical Hacking (course developed);
Undergraduate: COSC 1436 Introduction to Problem Solving with Computers II; COSC 2437
Data Structures; COSC 2470 COBOL; COSC 3353 Survey of Programming Languages COSC
3370 Software Engineering; COSC 3380 Undergraduate Research Experience; COSC 4310
Digital Forensics (course developed); COSC 4430 Artificial Intelligence; COSC 4354 Systems
Analysis and Design (Capstone course). Computer Architecture.
Tecnologico de Monterrey (ITESM)
Reasoning and Search Systems, Artificial Intelligence, Practical Training.
Texas A&M University
Artificial Intelligence, Software Engineering, Fortran 90.
Tecnologico de Saltillo
Electrical Power Systems, Control Theory 1, Control Theory II, Logical Circuits
Expert Systems, Artificial Intelligence, Software Engineering, Software Quality
Data Structures, Pascal, Discrete Mathematics, Analysis of Algorithms
Graduate Projects Committee Chair (Completed)
1. Shivani Reddy Atigada. A Collaborative Filtering Recommendation Algorithm based on
User Clustering and Item Clustering. November 12, 2014.
2. Ranjith Kumar Bodla. Implementation of a Prototype for Secure Online Payment System
Using Discrete Cosine Transformation and Permutative Stradding. November 12, 2014
3. Srilaxmi Gandra. Cyber Card Detection and Prevention System for Ecommerce.
November 2014.
4. Ricardo A. Garcia. Computer Forensics: Password Recovery Tool using Odroid-XU
Implementation. November 24, 2014
[Type text]

5. Mohammed Shahid Sultan. Detecting HTTP based Botnet Command and Control
Channels in Network Traffic using BotSniffer. December 1, 2014.
6. Yellu Sirisha.
7. Goddam Bharath Simha Reddy . Securly Sharing Multimedia Files Over Internet Using
Cryptography and Partial Steganography. December 1, 2014.
8. Haritha Devulapally. Implementation of an Android Application to help users Recover
and Secure a Lost Phone. July 2014
9. Anurag Reddy Muppidi. An Android Application to Integrate and Secure Social
Networks and Emails. July 2014.
10. Pratyusha Adasumalli. Implementation of an Android Application to Retrieve Information
from a Lost Android Device. Spring 2014.
11. Naga Sandeep Thatipally. Implementation of an Application Using Third Party Auditor
for Secure Cloud Storage. Spring 2014
12. Pavithra Roscillini Bandela. Implementation of an Android application to enhance
security in Social Networks. Spring 2014
13. Sumanth Minnakanti. Hiding information in Audio, video, and Images Using
Steganography. Spring 2014
14. Swetha Davana. Implementation of an Application to Secure Personal data Using
Enhanced Data Encryption Standard. Spring 2014.
15. Sachin Samrat Medavarapu. Improving The Efficiency of Packet Marking Using Modulo
Operation. July 2013. Thesis
16. Tingh Trun Applying  Back-Propagation Artificial Neural Networks to detect Attacks in
Computer Networks. April 9, 2013 – Thesis
17. Aditya Cheruvu “Email Spam Detector: A Tool to Monitor and Detect Spam Attacks”
December 2012.
18. Santosh Kumar Reddy Yerramorusu “Secure Calls and SMS Logs” December 2012
19. Anuudeep R. Kandi “Design and Implementation of a tool to help Computer Forensics
Instructors to Demonstrate Common Data Hidden Techniques” December 2012
20. Ashwini M. Achar. Design and Implementation of Software Tool to Detect and Prevent
Access to Malicious Users attacked by Cross-Site Scripting Attack. August 6, 2012
21. Vamshi Krishna Eranti Implementation of Hop-based Packet Marking for IP Traceback.
August 2, 2012.
22. Nithisha Repaka. Tool for Implementation of Strategies to detect Botnet Attacks August
2012.
23. Deepthi Jambula. Implementation of a Prototype to Detect Network Attacks by Analyzing
Irregular User Behavior. August 2012.
24. Stephen Smith. Tightening the Net: Examining and Demonstrating Commonly Available
Network Security tools. April 2012.
25. Ramchander Mudu. Design and Implementation of a Visualization System to Prevent
Cheating in Online Tests. April 24, 2012.
26. Ankush Vee. Evaluation of Cloud Security Using Firewalls. April 24, 2012.
27. Kartik Konnarraju. Data Security in Cloud Computing Using Encryption. April 25, 2012.
28. Rahul Guija. An Attacker Agent Identification Tool in Data Distributed Systems. April
25, 2012.
29. Santosh Kumar Birkur. Link Failure Detector and Simulation of Metrics in Distributed
Network. April 26, 2012.
[Type text]

30. Maria Anurag Basani. APuzzle-based Authentication Method with Serer Monitoring.
April 26, 2012.
31. Pradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012.
32. Arun Kumar Ankam. Implementation of a Tool o Conduct Live Forensics Acquisition in
Windows Systems. April 2012.
33. Kamalendar Kotha. Visual Cryptography Tool For Embedded Halftone Shares. May
2012.
34. Sudheer Chennuri. Integrated Forensics Tool for Web Browser Analysis. May 2012.
35. Srikanth Padakanti. Rootkits Detection Using Inline Hooking. May 2012.
36. Kalyani Suram. Analysis, design and implementation of a password cracking tool May
2012.
37. Divya Tara Puvvula. Implementation of a tool for Detecting and filtering Spam. May
2012.
38. Sai Saran Tockachichu. Virtual Environment based training material for Computer
Forensic Investigations May 2012.
39. Linh Manh Pham Real-Time Web-based Hyperspectral Data Viewing and Modeling.
December 1st, 2011.
40. Farath Fatima Detection of DataBase Attacks Using Computer Forensics Tools.
December 6, 2011.
41. Anusha Gollapudi. Web Log Analyzer. December 9, 2011
42. Sravani Pedamallu. Implementation of an Enhanced Hidden Markov Model in Detecting
Crediting Card Frauds. December 9, 2011.
43. Anusha Pesaru. Analysis, Testing, and Comparison of Open Source Encryption Tools.
December 13, 2011
44. Soumya Mitakanti – Forensics Analysis of the Lustre file System July 22, 2011
45. Rakesh Sambhuni – Checking the Security of a Website using a Phishing Website
Detector July 22, 2011
46. Drhuja Druthi – Forensics Analysis and Trusted monitoring System Prototype
Implementation in Cloud Computing . June 1, 2011
47. Pretthi Chitimalla – Steganography via Sound Effects in Power point Files June 1, 2011
48. Raja Mallepally Implementation of Applications to Improve iPhone Forensics Analysis
and Integrity of Evidence. June 2, 2011
49. Ragu Deshu – Implementation of a Tool to Defend Wireless Networks against
unauthorized Access. May 2011
50. Shravya Lanka – Enhancing Forensic Investigations in Large Capacity Storage Devices
using WEKA: A Data Mining Tool. May 2011
51. Chaitanya Chinthireddy – Implementation of an Intrusion Detection System based on
SNORT rules and using the Expert System tool Jess. May 2011
52. Midhula Thota. Social Networks Forensics. May 2011
53. Satish Mallepaly – Design and Implementation of WIN-RM (Windows registry Monitor)
forensic Tool. May 2011
54. Srikanth Kotha – ENCACHARE: An Anti-forensics tool to Encrypt, Camouflage,
Change, File properties, and Rename files. May 2011
55. Ruth Hardening . A Forensics Investigation of Windows Registries December 1, 2010
56. Jose Javier Escobar A Forensics Analysis of Network Security Logs on a Virtual
Environment. December 3, 2010
[Type text]

57. Barath Kumar Paravastu Design and Implementation of a Wireless Packet Sniffer.
November 22, 2010.
58. Sandeep Aluvaka. Implementation of a Steganalysis tool to detect Steganography in a
wireless forensics investigation. November 19, 2010
59. Srilakshmi Erasani. Analysis of Criminal Anti-Forensics Methodology and Anti-Anti
Forensics Defense. November 5, 2010
60. Sandeep Kumar Khanikekar Web Browsers Forensic Investigation. November 2, 2010
61. Vamshi K. Kancheti. Security Analysis of Social Networks. September 20, 2010.
62. Bandela Rini. Intrusion Detection System With Intelligent Agents Techniques. August
2010
63. Satya Harini Reddy. Analysis, Implementation, and Testing of Anti-Forensics Techniques
May 4, 2010
64. Urmila Konsam. “Designing Security Architecture and Securing Web Applications using
Secure Sockets Layer (SSL).” December 5, 2008.
65. Bhavani Sunke. “Analysis and Hardware Support for Intrusion Detection System Tools.”
December 4, 2008
66. Gonzalo Villegas. “Analysis of Tools for Conducting Wireless Penetration Testing.”
December 4, 2008.
67. Eduardo Arce. “Analysis of Mobile Phone Forensic Software Tools.” December 3, 2008.
68. Prashanth Gurrala. “Widgets for Mobile Device.” November 19, 2008.
69. Venkata Devarapally. “Survivable Systems and Secure Programming.” November 12,
2008.
70. Suman Paladugu. “Analysis of Mobile Phone Forensic Software Tools” October 16, 2008.
71. Rocky Martin. “Bluetooth and JAVA helping Sight Impaired.” May 2, 2008.
72. Narayanan Srinivasan. “Web Content Management System for an Online News Service.”
May 9, 2008.
73. Kevin Krause. “Introducing Shades of Gray into an Otherwise Black and White World:
The Consideration of Ethics in the Field of Information Assurance.” April 25, 2008.
74. Sai Ajay Kummar. “Research, Analysis and Efficiency Measurement of Forensics Tools
and Techniques to Detect Criminal Evidence to be used in a Court of Law.” Fall 2007.
75. Kiran Vupala. “Design of Internet Applications for Symbian OS Based Mobiles.” Fall
2007.
76. Ramakrishna Reddy Vodeti. “Study of Intrusion Detection Tools to Avoid Phising.” Fall
2007.
77. Anthony Weitekamp. “Derivation of Symmetric Encryption Keys From Synchronized
Chaotic Systems.” Spring 2007.
78. Veera Kishore Reddipalli. “Design and Analysis of Intrusion Detection Using
Honeypots.” Fall 2006.
79. Ramya Chakinarapu “Programming a Controller for Video Conversion and Text Data
Overlay.” Fall 2006.
80. Jayanthi R. Kalvemula. “Research, Analysis and Efficiency Measurement for E-mail and
SPAM Detection/Prevention.” Fall 2006.
81. Lakshami Pinneti. “Detection and Identification of Bacterial and Parasitic Pathogens in
Fish Husbandry using Web-based Expert Systems.” Spring 2006.
82. Vamshi Kankanala “Web-based Network Intrusion Detection Expert System.” Spring
2006.
[Type text]

83. Satrunga Pakala “Using Biometrics to Generate Public and Private Keys .“ Spring 2006.
84. Firoz Allahwali. “Implementation of an Offline Intrusion Detection System Using Data
Mining.” Spring 2006.
85. Ankita Nellimarla. “Biometric Authentication Tool for User Identification Based on
Keystroke Dynamics.” Summer 2006.
86. Ramesh Krishnamoorthy. “Active Change Auditing and Integrity Verification System
using MD5 Hashing.” Summer 2006.
87. Randy Cisneros. “Dictionary Attack Method for UNIX Systems Using Salt.” Fall 2005
88. Jasbir S. Parmar. “Network Intrusion Detection Using EagleX and Securepoint Nuzzler.”
Fall 2005.
89. Carl J. Perales. “Development of a Hybrid Knowledge-Based Training System for
Heating, Ventilating, and Air- Conditioning (HVAC) Load Calculations.” Fall 2005.
90. Karthik Duraisamy “Design and Implementation of a Visualization Statistical and
Analysis Tool for Comparison of Atmospheric Model Predictions of the Golf of Mexico.”
Fall 2005.
91. Shiraz Ahmed “Electronic Learning in Nursing Education.” Fall 2004.
92. Aijaz Ahmed “Signature-based Network Intrusion Detection System using JESS.”
Spring 2004.
93. Norma N. Nolazco. "Data Mining in Real World Database Application" Summer 2003.
94. Brian McCord. “Using Neural Networks and Genetic Algorithms to Predict Stocks.”
Summer 2003.
95. Allen J. Brotze “An Expert System for Training Medical Students.” Fall 2006.
96. Eunjoon Hwang. "Image Fusion." Fall 2003.
97. Jeremy D. Zapata. “A Learning Aggregator - A Bayesian Classification System for
Online Syndication.” Fall 2003
98. Leonardo F. Duarte "Web-Based Expert System for Diagnosis and Treatment of
Diabetes." Fall 2002.
99. Carlos Mendieta- "A Comparison of Artificial Neural Network Models for Predicting
Tide Levels." Fall 2001.
100. Tinu Singh. "Prototype Expert System for Diagnosis and Treatment of Diabetes."
Spring 2001.
101. Sreevani Pelala. “Robot Path Generator”. Fall 2000.
Graduate Projects Committee Member (Completed)
1. Himavarsha Surabi. Hybrid Model for Intrusion Detection using Data Mining Spring
2014.
2. Rakesh Kumar Srirangam. A Novel Steganographic Tool for Multilevel Protection
3. Anusha Pesaru – Extracting Social Behavior from Social Networks. December 13, 2011
4. Sharath Ranga Probabilistic Top-k Query Processing Using Central Limit Theory. July
23, 2011
5. Diana M. Rojas: Integrating Threat Modeling in the Secure Agent-Oriented Software
Development. December 2010
6. Archana Gudala: A Holistic Schema Matcher Application. December 2, 2010
7. Bo Dong. A Novel SemiDefinite-Based Localization System: Design and Evaluation.
Summer 2009
8. Rajesh Kanisetti. “Voice Interactive Internet Browser.” Spring 2009
[Type text]

9. Sreekrishna Nallela. Probabilistic Discovery of Motif’s in Primary Water Levels” 2009


10. Yashwanth Chintala. “Extracting the Semantic Structure of Web pages Using the Visual
Based Segmentation algorithm” December 3, 2008
11. Francisco Fonseca. “ Wireless Security” December 2, 2008
12. Srujan Kothapally – Data Integration for the Gulf of Mexico Satellite Observations.
November 24, 2008
13. Joseph Nalluri. Peer to Peer Database Integration using Piazza. September 25, 2008.
14. Sumit Agarwal. “Machine Translation.” Fall 2007.
15. Sheshidhar Odeti. “Wave Steganography.” Fall 2007.
16. Hemanth Gowda Krishnappa. “Fingerprint Verification using Mutual Information.” Fall
2007.
17. William J. Shelton Design of a Face Recognition Subsystem for Use in a Digital Photo
Album. Spring 2007.
18. Randy DeLeon. “Securing Sensitive Information in Cookies.” Spring 2007.
19. Felix Fuentes. “Biometrics and Vein Map Authentication.” Spring 2007.
20. Himanshu Pundir “Immediate Assessment of a Class Lecture Using a Handheld Device.”
Spring 2006.
21. Naresh Kumar Peapully Shroff. “Task Management System on Pocket PC.” Fall 2005.
22. Ashwani Tomar “Mapping and Monitoring of LiveOak Peninsula Area.” Fall 2005.
23. Kiran Jana. “Design and Implementation of Online Grading & Tracking System.” Fall
2005.
24. Gnan Mekala “Task Management System.” Fall 2005.
25. Bindu Yaparla. "Resource Management System for Disability Students." Spring 2005.
26. Bhargavi Hiremagalur. “WLAN Traffic Grapher Using Simple Network Management
Protocol (SNMP).” Fall 2004.
27. Krishna Reddy Dagula. "WinFind, A Tool to Measure the Bandwidth of Asymetric Links
on Internet." Fall 2003.
28. Raghavendra P. Desiraju. "The Design and Implementation of a Cashier System." Fall
2003.
29. Sae Hwang. "The Design and Implementation of a Virtual Engineering Technology
Laboratory." Fall 2002.
30. Abhijeet Trivedi. "Read, Review & Assess System." Spring 2002.
31. Kevin Nelson. "An Automated System for Administering and Scoring the Case Strategies
for Case Supervision Assessment Instrument." Fall 2001.
32. Rui Shen. "Design and Implementation of WinTrace: An Internet Path Characterization
Tool." Fall 2001.
33. Matthew Johnson. "Development of an Intelligent Autonomous Robotic System Using a
Hybrid Control Architecture and Enhanced Topological Mapping." Fall 2001.
34. Tao Huang. "Personal Investments-Assistance System." Summer 2001.
35. Ying Shen. "Online Indexed Reflection/Collection Student Notebook Structure."
Spring 2001.
36. Sean Babcock - "Clips to C Interface for Mobile Robot Control." Fall 2000.
[Type text]

37. Shekar C. Gudi. "Design of an Automated Natural Language Processing Algorithm for
an Industrial Environment." Summer 2000.
38. Kelly Mierzwa Todorov. "Medical Manager Word-Processing Interface." Spring 2000

Continuing Education
1. Parallel Computing TotalView Debugger. 7/19/2013. Lincoln Livermore National
Laboratory
2. Parallel Computing POSIX Threads Programming. 7/18/2013. Lincoln Livermore
National Laboratory
3. Parallel Computing Open MP. 7/18/2013. Lincoln Livermore National Laboratory
4. Parallel Computing Message Passing Interface. 7/17/2013. Lincoln Livermore National
Laboratory
5. Parallel Computing Moab. 7/17/2013. Lincoln Livermore National Laboratory
6. Introduction to Parallel Computing. 7/15-16/2013. Lincoln Livermore National
Laboratory
7. Black Hat Conference – Las Vegas Nevada – July 30 – August 4 2011
8. DEFCON Hackers Conference – Las Vegas Nevada August 6 – 8, 2011
9. Black Hat Conference – Las Vegas Nevada – July 28 – 29 2010
10. DEFCON Hackers Conference – Las Vegas Nevada July 30 – August 1 2010
11. University of Berkeley: Summer 2010
12. Fourth Annual Department of Homeland Security (DHS) University Network Summit
held March 10-12, 2010. Washington DC.
13. CERIAS Information Assurance Symposium. Purdue University. March 30 – April
1,2010. West Lafayette, Indiana
14. Information Assurance and Security Ethics Workshop. March 28 – 20, 2010 Purdue
University.
15. Minority Serving Institutions Technical Assistance – Capacity Building Conference.
September 21-24, 2009. Dallas Texas.
16. Rochester Institute of Technology – June 22-25, 2009 Information Assurance Boot Camp
17. Rochester Institute of Technology – Summer 2007 – Information Assurance Boot Camp
18. Access Data Boot Camp (Windows Registry) Corpus Christi TX, December 19 – 21,
2007. (Online)
19. Learning to Teach Online using the tool WebTycho. University of Maryland University
College. August 19 – September 23, 2007.
20. Information Assurance Workshop. Rochester Institute of Technology. August 6–17, 2007.
21. The Women's Institute in Summer Enrichment (WISE). Workshop on Sensor Networks.
Berkeley University. Berkeley Cal. June 10 - 16 2007.
22. Summer Workshop On Teaching about Terrorism (SWOTT).  Morehouse College in
Atlanta, Georgia, June 17-23, 2007.
23. Affinity Research Group Workshop. Corpus Christi TX, May, 2007.
24. Access Data Boot Camp (Forensics Tool Kit FTK) Portland Or. May 8–10, 2007.
25. TRUST Team for Research in Ubiquitous Computing. Workshop Spring Retreat. Oakland
Ca. March 19 – 20, 2007.
26. Joint NASA/NSF Conference for Higher EducationPrincipal Investigators, Faculty, and
Partners, Chantilly, VA.February22-24, 2007.
[Type text]

27. TRUST Team for Research in Ubiquitous Computing. Workshop Fall Retreat. Pittsburgh
Pa, October 5 – 6. 2006.
28. The Women's Institute in Summer Enrichment (WISE). Workshop on Ubiquitous Secure
Technology . Berkeley University. Berkeley Cal. July 5 – 11 2006.
29. 2nd Trustworthy Interfaces for Passwords and Personal Information workshop. Stanford
University. Palo Alto Cal. June 19, 2006.
30. EnCase Incident Response, Forensic Analysis and Discovery. Guidance Software –
Pasadena CA. November 15 – 18, 2005.
31. Software Engineering “SSI-Hub” Workshop. Texas A&M University. College Station,
TX. August 24-26 2005.
32. Symposium On Usable Privacy and Security (SOUPS 2005). Carnegie Mellon University.
July 12-14, 2005.
33. CISCO Security Professor Professional Development. CISCO Security Boot Camp.
Carnegie Mellon University, July 14-19, 2005.
34. Workshop on Case Studies Teaching in Science. Buffalo New York, May 14 – 21, 2005.
35. The Learning Paradigm College. Texas A&M University-Corpus Christi. April 8 – 9
2005.
36. Information Security for Network Managers. Carnegie Mellon University – Software
Engineering Institute. July 13 – 14, 2005.
37. Ethics in Computer Science. San Diego California. February 23 – 27 2005.
38. FASEB Grantsmanship Training Program Atlantic Beach, Florida April 28 – May 1,
2004.
39. Assessing NASA’s Educational and Research Funding Opportunities. San Antonio TX,
April 26 2004.
40. Information Assurance Education Graduate Certificate Program at Purdue University.
West Lafayette, Indiana. June 14 – August 6 2004.
41. Advanced Information Security for Technical Staff. Carnegie Mellon University –
Software Engineering Institute. May 10 –14 2004.
42. Information Security for Technical Staff. Carnegie Mellon – Software Engineering
Institute. March 29 – April2, 2004.
43. CISCO Security Professor Professional Development. CISCO Security Boot Camp.
TAMU-Commerce, Dallas TX, August, 21- 23 2003.
44. Information Assurance Capacity Building Program. Carnegie Mellon University.
Pittsburgh PA, July 6 - August 1 2003.
45. Dare to Soar. Cultural Competencies Workshop Managing Diverse Cultures at the Speed
of Change. Corpus Christi, Texas, October 11, 12 2002.
46. Introductory Workshop on Computational Science in Undergraduate Education. Texas
A&M University Corpus Christi.July 28 – August 3 2002.
47. Office of the Governor Budget and Planning State Grants Team. Writing to Win Corpus
Christi Texas, May 15-17 2002.
48. Writing Winning Proposals. San Antonio Texas, 2001.
49. Dr. Scheme Workshop. Texas A&M University-Corpus Christi, November 29, 1999.
50. Java Workshop. Texas A&M University-Corpus Christi. November 12, 1999.
Scholarship
Research Proposals Submitted Funded
1. Mario A. Garcia. Design Implementation and Testing of a Virtual Forensics Laboratory.
NSF-TUES 2012.
[Type text]

2. Mario A. Garcia Analysis of Mobile Devices Forensics Tools” Texas Research


Development Fund. 09/01/2009 – 08/30/2010 $24,000
3. Mario A. Garcia. “Use of Cell Phones to give Location Information to Blind People.”
Texas Research Development Fund. 09/01/2008 – 08/30/2009. $25,000.00
4. Co-PI, “Computing Infrastructure for Research-Based Learning (CIRBL)”, National
Science Foundation (NSF). PI: John Fernandez, Co-PIs: Mario Garcia, Dulal Kar, Scott
King. (9/2007-8/2010) (NSF agreed to award $650,000.00) – Garcia: Money used for a
graduate research student.
5. Ahmed Mahdy and Mario A. Garcia – Texas Research Development Fund –$34,900.00
September 2007 – August 2008. On-The Move Secure Broadband Wireless Networks for
Future Digital Battlefields. Garcia: Money used for a graduate research student and one
month of salary.
6. Mario A Garcia – Department of Homeland Security/University of Maryland University
College – Information Assurance Fellowship $30,000.00 (Postdoc on Information
Assurance) July 2006 – December 2007.
7. Mario A. Garcia – NSF/Quality Education for Minorities (QEM) Fellowship. Faculty
Summer Appointment Award $11,000.00 June – August 2006.
8. Melissa Dark, Nathan Harter, Linda Morales, and Mario Garcia. Collaboration: Ethics
Education in Computing – A moral Development/ Constructivist Approach. January 2006
– December 2009. $230,000.00. NSF Ethics in Science and Engineering (EESE) . Garcia
$45,000.00. Chapters on How to teach Information Assurance Ethics.
9. Stephen Dannelly, Dulal Kar, Mario Garcia, John Fernandez., NSF CISE MII 2003:
Extending and Strengthening the Pipeline in Computer Science. September 2003 –
August 2008. $1,499,997.00. Garcia: Implementation of the Digital Forensics Lab,
Implementation of the Network Security Lab.
10. John Fernandez, Mario Garcia, and Dulal Kar. CISCO. $62,901.00. Hardware donated to
Texas A&M University-Corpus Christi. September 1, 2003
Mini-Grants
11. Mario A. Garcia Educational Testing Service Faculty Fellowship – Princeton NJ June
2011
12. Mario A. Garcia ASEE – ONR Faculty Fellowship Navy Undersea Warfare Center
Newport RI, July August 2011
13. Mario A. Garcia Faculty Fellowship Summer Institute Program in Israel. June 9 – 17,
2010.
14. Mario A. Garcia – Texas Research Development Fund – “Using Artificial Neural
Networks and Statistics for the Creation of a Computer Network Intrusion Prevention
Model” $8,000.00 September 2006 – August 2007.
15. Ahmed Mahdy and Mario A. Garcia – Texas Research Development Fund – “Securing,
Extending and Levering City WiFi Networks: The Pioneer Corpus Christi Case”
$33,1500.00 September 2006 – August 2007.
16. Mario A. Garcia – College Research Grant - $3,000.00 September 2006 – August 2007.
17. Mario A. Garcia. WISE Fellowship for the WISE 2007: Women Institute in Summer
Enrichment program at the University of California, Berkeley. June 10- 16, 2007
18. Mario A. Garcia. Department of Homeland Security Fellowship to attend the Summer
Workshop On Teaching about Terrorism (SWOTT).  Morehouse College in Atlanta,
Georgia, June 17-23, 2007.
[Type text]

19. Mario A. Garcia. Enhancing Security in the Corpus Christi Wireless Network. $3,000.00
College Research Enhancement Program. April 20, 2007
20. Mario A. Garcia. Mini-grant award for participation in the Joint NASA/NSF Conference
for Higher Education Principal Investigators, Faculty, and Partners, Chantilly,
VA.February 22-24, 2007.
21. Mario A Garcia. Security Workshop.  Bethlehem PA, August 4-5th, 2005. $1,000.00
22. Mario A Garcia. TAMU-CC Science and Technology Scholarships Fall 2004 $ 5,000.00
23. Mario A Garcia. TAMU-CC University Research Grant. November 2004. $ 6, 411.00
24. Mario A Garcia . TAMU-CC College Research Grant. September 2004. $3,000.00
25. Mario A. Garcia. NSF SFS Information Assurance Workshop – Rochester Institute of
Technology August 6 – 17, 2007. $3,000.00
26. Mario A Garcia . TAMU-CC College Research Grant. September 2003. $2,000.00
27. Mario A. Garcia. Information Assurance Grant. - Carnegie Mellon University. Pittsburgh
PA. July - August 2003. $7,666.00
28. Mario A. Garcia. Federate Computing Research Grant - San Diego Cal. June 2003.
$1,000.0
Journal Publications

1. Pham M. L., Garcia M., and Mehrubeoglu R. “Real Time Control We-based
Hyperspectral Imaging System” IEEE Transaction on Computers. Submitted January 31,
2012
2. Garcia M., and Paravastu B. Packetxtract: A Wireless Traffic Sniffer. Submitted to the
International Journal of Network Security. January 15, 2012
3. Bachnak R., Chakinarapu R., Garcia M., and Kar. D. “A System for Video Conversion
and Text Data Overlay.” WSEAS Transactions on Circuits and Systems. ISSN 1109-2734
Issue 1, Volume 7, January 2008. Pp. 39-48.
4. Dark M., Morales L., Harter N., and Garcia M. “An Information Assurance Ethics
Education Model.” The Journal of Computing Sciences in Colleges. 2008 pp. 82-88.
5. Phillip Ian Wilson P. I and Garcia M. “A Modified Version of the Vigenere Algorithm”
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2,
February 2006.
6. Hytnen R. and Garcia M., “An Analysis of Wireless Security.” The Journal of Computing
Sciences in Colleges. 2006 pp. 210 – 216.
7. Fernandez J., Evans A., Camacho D., and Garcia M. “Software Engineering Industry
Experience – The Key to Success” The Journal of Computing Sciences in Colleges. 2006
pp. 230 – 236.
8. Garcia M. Cisneros R, and Bliss D. “Password Auditing Applications” The Journal of
Computing Sciences in Colleges. 2006 pp. 196 – 201.
9. Fernandez J, Smith S, Kar D, and Garcia M. “Computer Forensics – A critical need in
Computer Science Programs ” The Journal of Computing Sciences in Colleges. Vol.,
Number 4 pp. 315 – 322 April 2005.
10. Dannelly S, Steidley C, Pelala S. and Garcia M. “Robots and Search Algorithms: Real-
World Applications for Students.” Computer in Education Journal. Vol. XIV NO. 2 April
– June 2004.
11. Johnson M and Garcia M. “Implementation of Three Robotic Control Architectures for
Robot Navigation." The Journal of Computing Sciences in Colleges. Vol. 18, Number 4.
pp. 38 – 47 April 2003.
[Type text]

12. Starek M, Garcia M. and Tomer M. “An Expert System for Mineral Identification.” The
Journal of Computing Sciences in Colleges. Volume 17, Number 5. pp.193-197. April
2002.
13. Garcia M, A. Gandhi, T. Singh,L. Duarte, R. Shen, M. Danthu, S. Ponder, and H.
Ramirez. “ESDIABETES An Expert System in Diabetes.” The Journal of Computing
Science in Small Colleges. Amarillo, Texas. April 6-7, 2001. Vol. 16, Number 4. pp 166
– 175.
14. Garcia M. “Education in the Century XXI.” The Journal of Computing Science in Small
Colleges. Volume 15, Number 3 pp.16-24. April 2000.
15. Cantu-Ortiz, F., and Garcia-Espinosa M. (1992). “An Expert System for Diagnosing
Problems in Boiler Operation.” Expert Systems with Applications: An international
Journal, Pergamon Press, 5(3-4), pp 323-336, 1992
Publications (Peer-Reviewed)
1. Garcia M. Applications of Artificial Intelligence to Intrusion Detection. San Jose state
University. April 18, 2014.
2. Garcia M and Mallepally R. “Applications to Improve IPhone Forensics” Accepted for
publication at the 28th International Conference on Computer and Their Applications
CATA 2013. Honolulu Hawaii. March 4 – 6 2013
3. Garcia M and Mudu R. “Design and Implementation of a Visualization System to Prevent
Cheating in Online Testing” Accepted for publication at the E-Leader International
Conference. Singapore, January 2-4 2013.
4. Garcia M and R Sambhuti. “Phishing Web Sit Detector for Improving Network Security”
Accepted for publication and presentation at the E-Leader Berlin Conference June 2-4
2012
5. Garcia M and Pedamallu S. “Implementation of an Enhanced Hidden Markov Model in
Detecting Credit Card Frauds” Accepted for publication and presentation at the E-Leader
Berlin Conference June 2-4 2012
6. Garcia M and Rini B. Network Intrusion Detection Using Intelligent Agents. The 2011
International Conference on Security and Management (SAM'11: July 18-21, 2011, Las
Vegas USA). 23 % acceptance rate.
7. Garcia M, and Mallepally R. Implementations of Applications to Improve iPhone
Forensics Analysis & Integrity of Evidence. Techno Forensics Conference. Myrtle Beach,
SC. October 31 – November 1, 2011
8. Vodeti R, and Garcia M. Spoof Guard: An Internet Tool Used to Prevent Identity Theft.
E-Leader International Confeence. Budapest Hungary June 7-10, 2010
9. Krause K, and Garcia M. “Study of Ethics in Information Assurance” E-Leader
International Conference. Tallin Estonia. June 8-10, 2009. http://www.g-casa.com
<http://www.g-casa.com/> , ISSN 1935-4819.
10. Krause K, and Garcia M. “The Information Assurance Ethics Dilemma” E-Leader
International Conference. Tallin Estonia. June 8-10, 2009. http://www.g-casa.com
<http://www.g-casa.com/> , ISSN 1935-4819.
11. Villegas G, and Garcia M. Analysis of Tools for Conducting Wireless Penetration
Testing. Accepted for Publication at the Symposium on Privacy and Security
Applications. PASST-09 Vancouver CA. August 29-31, 2009
12. Villegas G, and Garcia M. Wireless Penetration Testing. Proceedings of the Symposium
on Privacy and Security Applications. Twenty-Fifth Annual Computer Security
Applications Conference (ACSAC). Honolulu Hawaii. December 7-112009
[Type text]

13. Arce E. and Garcia M. “Use of Forensic Software Tools to Acquire Evidence from
Mobile Devices” Proceedings of the The 2009 International Conference on Security and
Management (SAM’ 2009). Las Vegas NV. July 13- 16, 2009 pp.
14. Garcia M., and Krause K. “Relevance of Ethics in Information Assurance” Proceeding of
the VI International Conference on Engineering Education. March 8-11, 2009. Buenos
Aires Argentina.
15. Garcia M., Villegas G., and Alves S. “Wireless Penetration Testing.” Accepted for
publication at the Hawaii International Conference on System Sciences. Waikoloa Big
Island, Hawaii. January 5-8, 2009.
16. Fuentes F., Kar. D., and Garcia M. Biometrics and Vein Map authentication” E-Leader
Krakow Conference. Krakow Poland - June 9-11, 2008.
17. Weitekamp A, Kar, Garcia M, and Tintera G. “Synchronous Key Generation from
Chaotic Systems” Proceedings of the The 2008 International Conference on Security and
Management (SAM’ 2008). Las Vegas NV. July 13- 18, 2008 pp. 437-442.
18. Krause K, and Garcia M. “Introducing Shades of Gray into otherwise Black and White
World: Study of Ethics in Information Assurance.” Frontiers in Education. Racing
Toward Innovation in Engineering Education. Saratoga Springs, New York. October 22-
25, 2008
19. Weitekamp A, Kar, Garcia M, and Tintera G. “Symmetric Key Cryptography Using
Synchronized Chaotic Systems. Proceedings of the International Multi-Conference on
Engineering and Technological Innovation. June 29th – July 2nd, 2008 Orlando Florida. pp.
135 – 140.
20. Garcia M, and Krause K. “The Development of Video Based Educational Materials in
Ethics For Information Assurance.” 6th ASEE Global Colloquium on Engineering
Education. Istanbul Turkey. October 1 – 4, 2007.
21. Garcia M, and Allawali F. “Using Data Mining to Detect Intrusions in Computer
Networks.” 6th ASEE Global Colloquium on Engineering Education. Istanbul Turkey.
October 1 – 4, 2007.
22. Bachnak R., Chakinarapu, R. Garcia M., and Kar D., “Programming a Microcontroller for
Data Capture and Display,” Proceedings of the 16th Int. Conf. on software Engineering
and Data Engineering, SEDE-2007, pp. 276-281, July 9-11, 2007, Las Vegas, NV.
23. Bachnak R. Chakinarapu R. Garcia M, Kar D, and Nguyen T. "Real-Time Acquisition
and Display of Data and Video," Proceedings of the 7th Int. Conf. on Signal Processing,
Computational Geometry, and Artificial Vision (ISCGAV '07), pp. 233-239, Vouliagmeni,
Athens, Greece, August 24-26, 2007.
24. Krause K. and Garcia M. "The Development of Video Based Educational Materials in
Ethics for Graduate Information Assurance and Security Curriculum" accepted for
presentation and publication at the E-Leader conference, Prague, June 11-13, 2007
25. Krause K. and Garcia M. “Using Case Studies as an Approach to Teach Information
Assurance Ethics.” Proceedings of the 8th International Conference on Information
Technology Based Higher Education and Training. July 10-13, 2007. Kumamoto, Japan.
Pp.135
26. Allawali F. and Garcia M. “Using Data Mining to Detect Intrusions in Computer
Networks.” 2007 Proceedings of the ASEE Annual Conference and Exposition.
Information Systems Division. June 24-27, 2007. Honolulu Hawaii. AC 2007-173 pp 1-
12
[Type text]

27. Krishnamoorthy R. and Garcia M. “Active Change Auditing and Integrity Verification
System Using MD5 Hashing.” 2007 ASEE Annual Conference and Exposition.
Information Systems Division. June 24-27, 2007. Honolulu Hawaii.
28. Devi U. K., and Garcia M. “Ethical Hacking.” Accepted for publication at the FIE 2007
Frontiers in Education Conference. Milwaukee, Wisconsin October 10-13, 2007.
29. Garcia M, Dirks M. and Weatherson M. “How to Defend Against Identity Theft,
Phishing, and Web Spoofing” E-LEADER conference. Hong Kong, January 2 – 4, 2007.
http://www.g-casa.com/E_Leader_HongKong_Program.htm
30. Garcia M, Cisneros R, and Bliss D. “Password Auditing Tools.” Proceedings of the 5th
ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 –
12, 2006- pp. 331-338
31. Nerlimarla A. and Garcia M. “Biometric Authentication Tool for User Identification.”
Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de
Janeiro Brazil. October 9 – 12, 2006 pp. 287-293
32. Garcia M. and Durasaimy K. “SQL Injection Attacks and Prevention Techniques.”
Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de
Janeiro Brazil. October 9 – 12, 2006- pp. 343 -355
33. Garcia M. “How to Defend Against Identity Theft Attacks.” 2006 Alaska Information
Assurance Workshop. September 5-6. Fairbanks, Alaska.
34. Mardan M. and Garcia M. "DDoS Attacks Flooding Networks All Over the World"
Accepted for presentation at the The 10th World Multi-Conference on Systemics,
Cybernetics and Informatics: WMSCI 2006. Orlando Fl, July 16-19 2006
35. Garcia M “Network Intrusion Detection and Prevention Using Eaglex & Nuzzler”
Accepted for presentation at the The 10th World Multi-Conference on Systemics,
Cybernetics and Informatics: WMSCI 2006. Orlando Fl, July 16-19 2006
36. Garcia M, and Agarwal S. “What to Teach in Computer Ethics” Proceedings of the 7th
International Conference on Information Technology Based Higher Education and
Training” Sydney Australia. July 10 – 13 2006
37. Garcia M, Cisneros R, and Bliss D. “Password Auditing Tools.” 2006 ASEE Annual
Conference and Exposition. Information Systems Division. June 18-21, 2006. Chicago
Illinois.
38. Nerlimarla A. and Garcia M. “Biometric Authentication Tool for User Identification.”
2006 ASEE Annual Conference and Exposition. Information Systems Division. June 18-
21, 2006. Chicago Illinois.
39. Garcia M. and Durasaimy K. “SQL Injection Attacks and Prevention Techniques.” 2006
ASEE Annual Conference and Exposition. Computers in Education Division. June 18-21,
2006. Chicago Illinois.
40. Wilson I. P. and Garcia M. “Biometrics as a Cryptographic Key Generator” Hawaii
International Conference on System Sciences. January 4 – 7, 2006.
41. Dark. M, Garcia M, Qing, Y, Ghansah I, .Chen J, Lee H, and Shing C. “Adaptation of a
State of the Art Computer Forensics Course.” Proceedings of the The 8th International
Conference for Young Computer. Beijing University of Technology. Beijin China,
September 20-22, 2005.
42. Garcia M, Gopal G., Dick J., Swaminathan P., Sunil K. “Rule-based intrusion detection
system based on SNORT.” Network / Computer Security Workshop.  Bethlehem PA,
August 4-5th., 2005.
[Type text]

43. Garcia M, Dark M, Yuan Q, Ghansah I, Chen J, Shing C, and Lee H. “Adaptation of a
Computer Forensics Course.” Proceedings of the 6th International Conference on
Information Technology Based Higher Education and Training (ITHET 2005). July 7 – 9
2005. Dominican Republic.
44. Hwang E. and Garcia M. “An Image Fusion System” Accepted for presentation at the
IASTED International Conference on Artificial Intelligence and Applications (AIA 2005),
February 14 - 16, 2005, Innsbruck, Austria.
45. Aijaz A. and Garcia M. “Applications of Artificial Intelligence to Intrusion Detection”
Proceedings of the Internet and Multimedia Systems and Applications (EuroIMSA 2005)
Grindelwald Switzerland. Paper 462-110 pp. 281- 286 February 21 – 23 2005.
46. Young L. and Garcia M. “Using Recursion to Exploit Buffer Overflow”. IADIS
International Conference Applied Computing 2005. Algarave Portugal, February 22 – 25
2005.
47. Tomar A. and Garcia M. “Organic Compounds Qualitative Analysis Expert System” 2005
ASEE Annual Conference and Exposition. Emerging Trends in Engineering Education
Division. June 12-15, 2005. Portland Oregon
48. Balasubramanian A. Pundir H. Kankanala V. and Garcia M. “Enforcing Information
Assurance Using Biometrics” 2005 ASEE Annual Conference and Exposition .
Computers in Education Division. June 12-15, 2005. Portland Oregon
49. Young L. and Garcia M Configuring Modular Hi-Rise Fan Coil Units Using CLIPS. 2005
ASEE Annual Conference and Exposition . Computers in Education Division. June 12-15,
2005. Portland Oregon
50. Pinnenti L., Kankanala V., Chada K. and Garcia M. “Disease Diagnostic Tool Fish Therp
for Identification and Detection of Bacterial and Parasitic Pathogens in Fish Husbandry”
2005 ASEE Annual Conference and Exposition. Ocean & Marine Engineering Division.
June 12-15, 2005. Portland Oregon
51. Dark M, Yuan Q, Garcia M, Ghansah I, Chen J, Shing C. “Faculty-Curriculum
Development: What Works and What Doesn’t.” Secure IT 2005 Conference. San Diego,
California. April 19 – 22, 2005.
52. Manson D, Corey S. Fernandez J, Blyzka J, Farkas R, Partwo P, Garcia M “Beyond
Bootcamps: A model for ongoing curriculum development collaboration for faculty
attending an Information Assurance Bootcamp.” Secure IT 2005 Conference. San Diego,
California. April 19 – 22, 2005
53. Young L. Aubuchon M, and Garcia M. “Recursion and Buffer Overflow in C++
Programming.” Proceedings of the Symposium on Computing at Minority Institutions.
May 20 – 22, 2004 Orlando Florida. Pp 82 - 88
54. Garcia M, Gujjarlapudi R, and H,. Hatti “Organic Qualitative Expert System.” 2004
American Society for Engineering Education ASEE‘s 3rd annual International Meeting in
Beijing, China, Tsinghua University,September 7-10. 2004
55. McCord L, McCord B, and Garcia M. “A Medical Expert System for Moderate Sedation.”
Joint meeting of the International Conference on Education and Information Systems,
Technologies and Applications (EISTA 2004) and the International Conference on
Cybernetics and Information Technologies, Systems and Applications (CITSA 2004).
Orlando FL. July 21-25, 2004.
56. Garcia M, Gujjarlapudi R, and H, “Organic Qualitative Expert System.” 2004 American
Society for Engineering Education (ASEE 2004) Conference and Exposition Computers
in Education Division. Salt Lake City, June 20 -23
[Type text]

57. Clements J, Shelton W, and Garcia M. “An Expert System for Pump Diagnosis” Frontiers
in Education Conference (FIE 2004). Savannah Georgia, October 20 – 23
58. Steidley C, Dannelly S., Garcia M, and Pelala S, "Robots and Search Algorithm: Real-
World Applications for Students. Proceedings of the 2003 American Society for
Engineering Education Annual Conference & Exposition. Session 1320. Nashville
Tennessee, June 22-25, 2003
59. Steidley C, Dannelly S., Garcia M, and Pelala S, "Robots and Search Methods:
Abstraction Through Implementation", Proceedings of the American Society for
Engineering Education Gulf- Southwest 2003 Conference, Session 3B, CD-ROM,
Arlington, TX, March 2003.
60. Dannelly S., Steidley C., Garcia M., and Pelala S. "Physical World Applications of Search
Algorithms for Students" Proceedings of the Fourteenth Annual Consortium for
Computing Sciences in Colleges South Central Conference. Jackson, MS. April 11 - 12,
2003 pp. 95 - 104
61. Garcia M and Patterson-McNeill. "Learn How to Develop Software Using the Toy LEGO
Mindstorms" 2002 ASEE Annual Conference and Exposition Proceedings. Boston
Massachusetts, November 6 - 9 2002. Session S4D. Paper 1644.pdf
62. M. Johnson, Garcia M. Robot Navigation: "Determining the Shortest Path Using
Enhanced Topological maps." Accepted for publication in the International
Instrumentation, Systems, and Automation South American 2002 conference. Sao Paolo,
Brazil, November 19-22
63. M. Johnson, Garcia M. Autonomous Intelligent Robots." Accepted for publication in the
International Instrumentation, Systems, and Automation South American 2002
conference. Sao Paolo, Brazil, November 19-22
64. Dannelly S, Steidley C, and Garcia M. "Integrating the use of Sensors in the Curriculum."
Accepted for publication in the International Systems and Automation Symposium, April
9-11 2002, Monterrey N.L. Mexico
65. Mendieta C. and Garcia M. "Predicting Primary Water Levels using Backpropagation and
General Regression Neural networks. 2002 American Society for Engineering Education
(ASEE) Annual Conference and Exposition Proceedings. Session 1532. Paper # 137.
Montreal Canada, June 16-19 2002.
66. Starek M, Garcia M, Tomer M, Bhaskar K. " Minerals Identification using An Expert
System." 2002 American Society for Engineering Education (ASEE) Annual Conference
and Exposition Proceedings. Session 1532. Montreal Canada, June 16-19 2002.
67. Garcia M and Patterson-McNeill. "Learning How to Develop Software Using the Toy
LEGO Mindstorms" Accepted for publication in the 7th Annual conference on Innovation
and Technology in Computer Science Education (ITiCSE) Denmark, June 24-26, 2002.
68. Mendieta C. and Garcia M. "Comparison of Artificial Neural Networks Models for
Predicting Tide Levels." Accepted for publication in the IASTED International
Conference on Artificial Intelligence and Applications. Malaga Spain AIA 2002.
September 9-12, 2002.
69. Garcia M. “ Blackboard: A WEB-assisted and WEB-Based Instruction Software."
Proceedings of the IASTED International Conference on Internet and Multimedia
Systems and Applications. Honolulu Hawaii, August 13-16, 2001. pp. 35- 40.
70. Garcia M, Steidley C. "Intelligent Diabetes Management." 2001 ASEE Annual
Conference and Exposition Proceedings. Session 1520. Albuquerque New Mexico. June
24-27, 2001
[Type text]

71. Reyes E., Garcia M., and Steidley C. "Using Genetic Algorithms in the Global Wiring of
Integrated Circuits." Proceedings of the Annual Conference of the American Society for
Engineering Education, CD-ROM Session 3520, Paper 5, June 2000.
Publications (Peer-Reviewed before 1999)
1. Garcia M., Ellis, N., and Simmons D., "Intelligent Agents Applied to Software
Management" International Symposium on Computer Science, November 11–13, 1998.
pp. 63 – 69. Mexico D.F.
2. Muniz E., Escamilla J., Garcia M., “Arquitectura Distribuida de Agentes Para enlace de
Intereses” XX Congreso Internacional de Ingenieria Electronica. ELECTRO 98
October 26–30, 1998. pp. 6–11. Chihuahua, Chihuahua, Mexico
3. Garcia, M., Ellis, N., and Simmons D., "A Knowledge Base System used to Predict
Schedule, Cost, Effort, and Defects in a Software Development Process" 9th International
Symposium on AI November 12-15 1996, Cancun, Mexico. pp. 306–314.
4. Garcia, M., Ellis, N., and Simmons, D., "Intelligent Software Life Cycle Phase Predictor"
8th International Symposium of AI. Monterrey, N.L., Mexico. October 1995, pp. 342 -
347.
5. Garcia, M., Ellis N., and Simmons D., " Intelligent Software Status Predictor"
Fuzzy 95. November 7-9 1995, San Francisco Cal., pp. 15-1 - 15-8
6. Garcia, M., and Cantu, F., "Trouble Shooting Expert System for the Combustion of Steam
Generators" The World Congress of Expert Systems. Orlando Florida December 16-19,
1991.
7. Garcia, M. and Gonzalez, S., "Design of a Power Plant Control System"
Proceedings of the IEEE Mexicon 81 Vol. III. Guadalajara, Jalisco, Mexico.
8. Trevino, G., Madariaga A., and Garcia, M., "SECAL" Sistema Experto en Calderas
VI Reunion Nacional de Inteligencia Artificial. Mexican Society of Artificial Intelligence
Queretaro, Queretaro. Mexico. July 1989 pp. 463 – 470.
Publications with Students. (Student Conferences)
1. Mallepally R. and Garcia M. IPhone Forensics Techniques. 5th Annual Graduate Scholarly
Works Symposium. Corpus Christi TX, April 22, 2011.
2. Iker Okan Aker and Mario A. Garcia. Visualization in Computer Forensics. 18th Annual
Student Conference for Research & Creative Arts.Houston TX, April 25 -26, 2012
3. Pradeep Pothnak and Mario A. Garcia. Apple Forensics on Third Party Applications. 18th
Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26,
2012
4. Farath Fatima and Mario a. Garcia. Achieving Critical Infrastructure Protection through the
Interaction of Computer Security and Network Forensics. 18th Annual Student
Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012
5. Akshara Upaluri and Mario A. Garcia Improvement in Digital Forensics with the basis of
Reusability. 18th Annual Student Conference for Research & Creative Arts.Houston TX,
April 25 -26, 2012
6. Maria A. Basani and Mario A. Garcia. Improving Kerberos Security Protocol using Various
Logics. 18th Annual Student Conference for Research & Creative Arts. Houston TX. April
25 -26, 2012
7. Srikanth Padakanti and Mario A. Garcia. Session Based Tunnelling in VPN using IPSec
protocol. 18th Annual Student Conference for Research & Creative Arts. Houston TX,
April 25 -26, 2012
[Type text]

8. Aditya Cheruvu and Mario A. Garcia Identification and analysis of wormhole attacks in
wireless networks. 18th Annual Student Conference for Research & Creative Arts.
Houston TX, April 25 -26, 2012
9. Chandupatla Druha Druthi and Mario A. Garcia Detection Techniques for Vulnerabilities
in Web Services. 18th Annual Student Conference for Research & Creative Arts. Houston
TX, April 25 -26, 2012
10. Rajavardhan Mallepally, Preethi Chittimalla, and Garcia Mario. iForensic Tool: The
Ultimate iPhone Forensic Tool. 4th Annual Graduate Scholarly Works Symposium.
Corpus Christi TX, April 23, 2010
11. Ruth Harding and Mario Garcia. A Forensics Analysis of Microsoft Windows Registry.
4th Annual Graduate Scholarly Works Symposium. Corpus Christi TX, April 23, 2010
12. Garcia Mario. “Computers Under Attack.” Instituto Tecnologico y de Estudios Superiores
de Monterrey. Monterrey N.L. Mexico, April 18, 2008.
13. Arce E., Villegas G., and Garcia M. “Intrusion Detection Systems” Fourteen Annual
Student Conference for Research and Creative Arts. April 16-18, 2008.
14. Arce E., Villegas G., and Garcia M. How to select a PDA and a Wireless Card” Fourteen
Annual Student Conference for Research and Creative Arts. April 16-18, 2008.
15. Kothapally S, and Garcia M. Security Analysis in Steganography” Fourteen Annual
Student Conference for Research and Creative Arts. April 16-18, 2008.
16. Nalluri J, and Garcia M. “Attacks against Wireless Sensor Networks” Fourteen Annual
Student Conference for Research and Creative Arts. April 16-18, 2008.
17. Paladagu S, and Garcia M. “Forensics Analysis of Cellular Phones” Fourteen Annual
Student Conference for Research and Creative Arts. April 16-18, 2008.
18. Vangala R. K, and Garcia M. “ Security Faults in the Wireless Application Protocol”
Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.
19. Dasari S, and Garcia M. “Bluetooth Vulnerabilities” Fourteen Annual Student Conference
for Research and Creative Arts. April 16-18, 2008.
20. Hayford A. O., and Garcia M. Wireless LAN Vulnerabilities” Fourteen Annual Student
Conference for Research and Creative Arts. April 16-18, 2008.
21. Duarte A. and Garcia M. “ The Breakdown of Malware” Graduate Scholarly Works
Symposium. March 29, 2008.
22. Sinclair A, and Garcia M. “Statistical-Based Intrusion Detection” Graduate Scholarly
Works Symposium. March 29, 2008.
23. Sunke B. and Garcia M. Wireless Security Vulnerabilities” Graduate Scholarly Works
Symposium. March 29, 2008.
24. Nalluri J. and Garcia M. “Public Key Cryptography” Graduate Scholarly Works
Symposium. March 29, 2008.
25. Dang, M.D, and Garcia M. “ Vulnerability Analysis in Operating Systems” Graduate
Scholarly Works Symposium. March 29, 2008.
26. Kanisetti R. and Garcia M. “ The Study of Vein Patterns for Biometric Security”
Graduate Scholarly Works Symposium. March 29, 2008.
27. Ponnala A., Shaik A., and Garcia M. Vulnerabilities in Virtual Machines” Graduate
Scholarly Works Symposium. March 29, 2008.
28. William B, Mahady A, and Garcia M. “Free Space Optics(FSO) Topology, Architecture,
Data Transmission, Routing, and Future Developments.” AAAS Swarm 82nd Annual
Meeting and University of Houston Clear Lake 13th Annual Student Conference for
Research and Creative Arts. Clear Lake Houston, April 18-22, 2007
[Type text]

29. Garcia M. Community Outreach. SSI Hub Open Standard Workshop. Clear Lake
University, Houston TX, March 3 – 5, 2007
30. Garcia M. Security Courses ISE/SSIP Hub Workshop. Dallas Texas August 3 – 5, 2007
31. Yashwanth C, and Garcia M. “Game Systems Forensics.” AAAS Swarm 82nd Annual
Meeting and University of Houston Clear Lake 13th Annual Student Conference for
Research and Creative Arts. Clear Lake Houston, April 18-22, 2007
32. Garimella A. S. and Garcia M. “Overview and Analysis of Forensics Tools.” AAAS
Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student
Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007
33. Paladagu R. S. and Garcia M. “A study on Honeypoys.” AAAS Swarm 82nd Annual
Meeting and University of Houston Clear Lake 13th Annual Student Conference for
Research and Creative Arts. Clear Lake Houston, April 18-22, 2007
34. Vuppala K. and Garcia M. “Symbian Operating System for Mobile Devices.” AAAS
Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student
Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007
35. Dopierala R. and Garcia M. “Biometric Security.” Graduate Student Research
Symposium. April 21, 2007, Texas A&M University-Corpus Christi.
36. Ramana V. and Garcia M. “Buffer Overflow in C/C++ and Security Vulnerabilities.”
Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus
Christi.
37. Gurrala P. and Garcia M. “Data Mining and Security” Graduate Student Research
Symposium. April 21, 2007, Texas A&M University-Corpus Christi.
38. Smith S. and Garcia M. “Digital Forensics- New Developments in a Rapidly Evolving
Field.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-
Corpus Christi.
39. Gilford R. and Garcia M. “Security of the Stream Control Transmission Protocol STCP.”
Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus
Christi
40. Krishnappa H. and Garcia M. “Mobile E-commerce Security, Components and Design.”
Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus
Christi
41. McConnell N, Mahdy A., and Garcia M. Mobile WiMax. Graduate Student Research
Symposium. April 21, 2007, Texas A&M University-Corpus Christi
42. Garcia M. Organic Qualitative Expert System “CSA Mechanical & Transportation
Engineering Abstracts. 2007
43. Garcia M. “Password Cracking: A Dilemma Case Study in Computer Security.”
University at Buffalo, Buffalo New York, May 25, 2006
44. Fonseca F. and Garcia M. “Computer Authentication using Biometrics” Twelfth Annual
Student Conference for Research and Creative Arts. University of Houston-Clear Lake,
Houston TX, April 19 - 20 2006.
45. DeLoera S and Garcia M. “Biometrics Fingerprint Attainment”. Twelfth Annual Student
Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston
TX, April 19 - 20 2006.
46. Cao Steve and Garcia Mario. “An Introduction to Honeypots” Twelfth Annual Student
Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston
TX, April 19 - 20 2006.
[Type text]

47. Krishnappa H.G. and Garcia M. “Biometrics Iris Recognition” Twelfth Annual Student
Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston
TX, April 19 - 20 2006.
48. Chakinarapu R. and Garcia M. “Computer Forensics” Twelfth Annual Student
Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston
TX, April 19 - 20 2006. Twelfth Annual Student Conference for Research and Creative
Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006.
49. Reddiplalli V. K. and Garcia M. “Role of Artificial Neural Networks in Intrusion
Detection”
50. O’Brien T, and Garcia M. “Anti-Virus effectiveness.” Eleventh Annual Student
Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston
TX, April 20 – 21 2005.
51. MacLeod A. and Garcia M. “Finding Vulnerabilities in Computers.” Eleventh Annual
Student Conference for Research and Creative Arts. University of Houston-Clear Lake,
Houston TX, April 20 – 21 2005.
52. Hytnen R. and Garcia M. “An Analysis of Wireless Security Fidelity.” Eleventh Annual
Student Conference for Research and Creative Arts. University of Houston-Clear Lake,
Houston TX, April 20 – 21 2005.
53. Landois L. and Garcia M. Use of Artificial Intelligence for Intrusion Detection. Eleventh
Annual Student Conference for Research and Creative Arts. University of Houston-Clear
Lake, Houston TX, April 20 – 21 2005.
54. Gilford R. and Garcia M. “What to Know When Protecting Computer Networks.”
Eleventh Annual Student Conference for Research and Creative Arts. University of
Houston-Clear Lake, Houston TX, April 20 – 21 2005.
55. Balasubramanian A. Pundir H. Kankanala V. and Garcia M. “Enforcing Information
Assurance Using Biometrics” The Texas A&M University System 2nd Annual TAMUS
Pathways Student Research Symposium. October 14 – 15 2004
56. Duraisamy K., Allawali F., and Garcia M. “An Expert System for Corn Disease
Identification” The Texas A&M University System 2nd Annual TAMUS Pathways
Student Research Symposium. October 14 – 15 2004
57. Allawali F. and Garcia M. “Computer Intrusion Detection Using Data Mining” The Texas
A&M University System 2nd Annual TAMUS Pathways Student Research Symposium.
October 14 – 15 2004
58. Durbha K. and Garcia M. “Threats and Facility Requirements in Physical Security” The
Texas A&M University System 2nd Annual TAMUS Pathways Student Research
Symposium. October 14 – 15 2004
59. Shroff N., and Garcia M. “Secure Socket Layer (SSL) Protocol; The Undisputed
Heavyweight Champion for web Site Authentication and Encryption of Transactional
data” The Texas A&M University System 2nd Annual TAMUS Pathways Student
Research Symposium. October 14 – 15 2004
60. Hakl A. and Garcia M. “Implementation of two Algorithms to Compare Public and
Private Key Cryptography.” Tenth Annual Conference for Research & Creative Arts.
University of Houston-Clear Lake. April 23-24, 2004
61. Aijaz A. and Garcia M. “Signature-based Network Intrusion Detection System Using
JESS (SNIDJ.” Tenth Annual Conference for Research & Creative Arts. University of
Houston-Clear Lake. April 23-24, 2004
[Type text]

62. Strickland J., Fuqua S.and Garcia M. “Social Engineering in the University Setting Third
Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November
8, 2003.
63. Hakl A. and Garcia M. “Public vs. Private Key Cryptography.” Third Undergraduate
Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.
64. Ross1, A. Trevino F. and Garcia M. “Computer Viruses, Worms, and Trojan Horses.”
Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi.
November 8, 2003.
65. Peña M. and Garcia M. “Hacking Tools: Friend or Foe?” Third Undergraduate Research
Symposium. Texas A&M University-Corpus Christi. November 8, 2003.
66. AuBuchon M. and Garcia M. Program Coding Vulnerabilities: The Buffer Overflow.
Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi.
November 8, 2003.
67. Liza M. and Garcia M. “Iris Recognition: Society and it’s Anxiety” Third Undergraduate
Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.
68. Krishna B, Vangala K, and Garcia M, CORN-EX: An Expert System for Corn Insect
Damage Diagnosis . Ninth Annual Conference for Research & Creative Arts University of
Houston-Clear Lake. April 23-24, 2003
69. Desiraju R, Jana K, and Garcia M, An Expert System For Inorganic Elements
Ninth Annual Conference for Research & Creative Arts. University of Houston-Clear
Lake. April 23-24, 2003
70. Shih-kai H. and Garcia M. An Expert System For PRECAST and PRESTRESS
CONCRETE. Ninth Annual Conference for Research & Creative Arts. University of
Houston-Clear Lake. April 23-24, 2003
71. Laurel C., Fuentes F, J. Johnson J., and Garcia M "Efficiencies of LEGO Mindstorms
Programming Languages" 2003 National Conference on Undergraduate Research (NCUR
2003). UTAH. March 2003.
72. Laurel C, Fuentes F., and Garcia M. "Fundamental Computer Programming with LEGO
Mindstorms." Undergraduate Research Symposium. Texas A&M University-Corpus
Christi. November 2, 2002.
73. Daggula K.R., and Garcia M. Disease Diagnostic Identification and Recommendations for
the Shrimp Industry." Undergraduate Research Symposium. Texas A&M University-
Corpus Christi. November 2, 2002
Publications Before 1999
1. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Software Engineering Class Analysis”
Report Number: CSL-TR-28-95. Software Process Improvement Laboratory, Texas A&M
University, January 26, 1995.
2. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Measurement Ranges”, Working
Paper. Software Process Improvement Laboratory, Texas A&M University,
November 30 1996.
3. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Software Engineering Class Analysis”
Working Paper. Software Process Improvement Laboratory, Texas A&M University,
December 20, 1996.
4. Garcia, M., "Software Management" Technical Report, 1995, Cognitive Systems
Laboratory. Texas A&M University.
5. Garcia, M., "Estimating Software Size" Technical Report, 1995, Cognitive Systems
Laboratory. Texas A&M University.
[Type text]

6. Garcia, M., "Improving Software Reliability Using Software Metrics" Technical Report,
1995, Cognitive Systems Laboratory. Texas A&M University.
7. Garcia, M., "How to implement a Metrics Program" Technical Report, 1995, Cognitive
Systems Laboratory, Texas A&M University.
8. Goodman, S., Garcia, M., and Ellis, N., "Intelligent Assistants/Associates Overview.
Editorship (Book Chapters)
1. Garcia, M., and Cantu, F., SEMAT, An Expert System for Diagnosing problems in Tooth
Paste Tube Machines. Operational Expert Systems in Mexico. F. Cantu. Pergamon Press,
1991, pp. 74 – 85.
2. Garcia, M., and Cantu, F., SECAL, An Expert System for Diagnosing Problems in Boiler
Operation. Operational Expert Systems in Mexico. Cantu, F., Pergamon Press, 1991, pp.
7- 26
3. Instructor materials for the book: Computer Forensics: Incident Response Essentials.
Warren G. Kruse and Jay Heiser. Addison Wesley.
Presentations (invited talks)
1. Analysis and Investigation of SCAP tools (July 13) Naval Undersea Warfare Center,
Newport RI. July13, 2012.
2. Defense in Depth – Applications of Artificial Intelligence Techniques to Intrusion
Prevention. Naval Undersea Warfare Center, Newport RI. July17, 2012.
3. Challenges in Computer Forensics: A Research Perspective. Naval Undersea Warfare
Center, Newport RI. August 23 2011.
4. Analysis of Computer Forensics tools. Naval Undersea Warfare Center, Newport RI.
August 12 2011.
5. Analysis of Educational Testing Service ETS tools and its incorporation into Blackboard
ETS Faculty Symposium. June 2011. Princeton NJ.
6. Computers Under Attack. Instituto Tecnologico y de Estudios Superiores de Monterrey.
Monterrey Mex, April 14, 2008.
7. Simposium Internacional de Sistemas Computacionales. Instituto Tecnologico de Saltillo,
Saltillo Coahuila Mexico. Octubre 2001
8. Simposium Internacional de Sistemas Computacionales. Instituto Tecnologico de Saltillo,
Saltillo Coahuila Mexico. Octubre 1998
9. II Jornadas Academicas. Conferencista magistral. Instituto Tecnologico de Lerdo. Cd.
Lerdo Durango, Mexico April 1998
Paper Reviewer
1. 2008 Annual International Journal of Computer Mathematics
2. 2008 Hawaii International Conference on Systems Science HICSS-40
3. IASTED Advances in Computer Science and Technology ACST 2006
4. Technical paper reviewer for the Consortium for Computing in Small College: Seventeen
Annual South Central Conference. 2006
5. ASEE 2006
6. SIGCSE 2006.
7. Technical paper reviewer ITiCSE 2005
8. Communications of the ACM, 2005
9. Hawaii International Conference on System Sciences Author Services, 2005
10. Technical paper reviewer for the IASTED Applied Informatics 2004
11. Technical paper reviewer for Circuits, Signals, and Systems (CSS 2004)
12. Technical paper reviewer for the IASTED Applied Informatics 2003
[Type text]

13. Technical paper reviewer for the Consortium for Computing in Small College: Fourteen
Annual South Central Conference. 2003
14. Technical paper reviewer for the Consortium for Computing in Small College: Thirteen
Annual South Central Conference. 2002
15. Technical paper reviewer for the IASTED Applied Informatics 2002
16. Technical paper reviewer for ITiCSE 2002
17. Technical paper reviewer for ASEE 2002
18. Technical paper reviewer for FIE 2002
19. Technical paper reviewer for the Consortium for Computing in Small College: Twelfth
Annual South Central Conference. 2001
20. Technical paper reviewer for the Consortium for Computing in Small College: Eleventh
Annual North East Conference. 2001
Grant Reviewer
1. NSF-Scholarship for Service – SFS. May 5-7, 2014
2. NSF Graduate Research Fellowship Evaluation. Washington DC. January 2013
3. NSF NDSEG and SMART. Washington DC January 2013
4. DoD – ASEE Graduate Research Fellowship Evaluation. Washington DC. February 2012
5. NSF Graduate Research Fellowship Evaluation. Washington DC. February 2011
6. NSF Graduate Research Fellowship Evaluation. Washington DC. February 2010
7. NSF Graduate Research Fellowship Evaluation. Washington DC. February 2009
8. National Science Foundation Course, Curriculum, and Laboratory Improvement Program.
Washington DC July 20 2009.
9. Ethics and values in Science, Engineering and technology Washington DC. May 2008
10. Graduate Research Fellowship Evaluation. Washington DC. February 2008
11. Minority Serving Institutions – Department of Homeland Security. Washington DC.
September 2007.
12. Ethics and values in Science, Engineering and technology Washington DC. May 2007
13. Graduate Research Fellowship Evaluation. Washington DC. February 2007
14. NSF CCLI Phase II and III Washington DC, March 2006
15. NSF 2005 Graduate Research Fellowship Program. Washington DC, February 2005.
16. Review Proposals submitted to the National Science Foundation Cyber Trust Program.
Washington DC, June 2004.
17. Review Proposals submitted to the National Science Foundation Course, Curriculum, and
Laboratory Improvement Program. Washington DC July 20 2003.
18. Review Proposals submitted to the National Science Foundation Adaptation and
Implementation Program. Washington DC. January 2003.
19. Review Proposals submitted to the National Science Foundation Course, Curriculum, and
Laboratory Improvement Program. Washington DC July 20 2002.
20. Review Proposals submitted to the National Science Foundation Course, Curriculum, and
Laboratory Improvement Program. Washington DC July 20 2001.
21. Review of Panel Proposals submitted to the National Science Foundation Division of
Undergraduate Education. Washington DC July 2000.
22. Review NSF ITR proposals. San Francisco Cal. May 2000.
Book Reviewer
1. Review 12 Chapters for the book: Computational Intelligence.: Theory and
Implementation. Morgan Kaufman Publishers. October 2001 - February 2002
[Type text]

2. Review two chapters from a CS-2 with Java entitled "A Basic Collection Class and the
List Abstract data Type" Scott/Jones. January 2002.
3. Review of a distance education site for the book "Starting out with C++. Tony Gaddis.
Scott Jones. October 18, 2001
4. Review two chapters for a CS2 text using Java, entitled "Introduction: What We Will
Study and Why" and "Fundamental Data Structures". Scott/Jones Publishing August 16,
2001
5. Review of a chapter for a CS2 text using Java entitled "The List Abstract Data Type."
Scott/Jones Publishing March 12, 2001
6. Review three chapters on Patterns Based Software engineering. Scott/Jones Publishing
February 26, 2001.
7. Review of an outline for a prospective CS2 text. Scott/Jones Publishing May 8, 2000
Professional Service
1. IASTED International Program Committee Member on Wireless and Optical
Communications (WOC) 2007)
2. IASTED International Program Committee Member (IPC) “Internet and Multimedia
Systems and Applications (IMSA 2008)
3. Board of Directors of the Software Engineers Association 2007
4. Chair of the session: “Community Outreach” Shared Software Infrastructure SSI-Hub.
Clear Lake University. March 3 – 6, 2006.
5. Member of the IEEE Computer Society Taylor Booth Education Award 2005, 2006
6. Chair of the Outreach committee of the SSI Hub. 2006
7. Board of directors of the Shared Software Infrastructure SSI – Hub project. Texas A&M –
IBM. 2006.
8. Co-chair: 1st Symposium on Information Assurance. Texas A&M University-Corpus
Christi. Corpus Christi TX, January 29 2005
9. Planning committee for the ASEE Gulf Southwest Conference 2005, Corpus Christi TX,
10. Paper session chair. Copyright, Watermarking, and Security. IASTED International
Conference on Internet and Multimedia Systems and Applications. February 21 – 23,
2005
11. Graduate Research Fellowship Evaluation. Washington DC. February 2005
12. Paper session chair. Frontiers in Education 2004. Savannah Georgia, October 20 – 23
13. Member of the IASTED Technical Committee on "Artificial Intelligence and Expert
Systems" 2001-2004
14. Member of the TRUST Identity Theft group (Stanford, Berkeley, Cornell, Vanderville)
15. Member of the IEEE
University/College - Service
1. International Education Council Committee 2010
2. Study Abroad Committee 2007 - 2010
3. Faculty Senate 2002 – 2006
4. Senate Faculty Affairs Committee 2002 – 2006
5. Senate Faculty Budget Committee 2004 – 2006
6. Senate Faculty Affairs Committee Chair2005 – 2006
7. Senate Executive Committee 2005 - 2006
8. University Sports Committee – 2000 – 2006
9. International Education Scholarship Committee member – 2006 – 2007
10. WEB Courseware Research Committee 2003
[Type text]

11. College Curriculum Committee


12. College Tenure Committee 2006 – 2010
Department Service
1. Computing Sciences Tenure Committee Chair – August 2007 – July 2008; 2010
2. Computing Sciences Graduate Studies Committee Chair - August 2007 – July 2008
3. Computing Sciences Chair Search Committee member 2007
4. ABET committee member – 2005 – 2007
5. Department Tenure Committee – 2006 – 2007
6. Department Mid-term Review Committee 2006 - 2007
7. Computing Sciences Security Policy Committee member – 2006 – 2007
8. Computing Sciences Network Security research group – 2006 – 2011
9. Computing Sciences Software Engineering Research group – 2006 – 2007
10. Computing Sciences BAAS program review 2007
11. Engineering Faculty Search Committee – 2006
12. Computer Science Network Administrator Search Committee 2005
13. Computer Science Graduate Program Review 2005

Awards
Faculty Fellowship Summer Institute in Israel 2010.
FF2Israel June 9th to 17th.

S-ar putea să vă placă și