Guillermo A. Francia III

Orcid: 0000-0001-8088-2653

According to our database1, Guillermo A. Francia III authored at least 32 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revolutionizing Payload Inspection: A Self-Supervised Journey to Precision with Few Shots.
CoRR, 2024

Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach.
CoRR, 2024

A Transformer-Based Framework for Payload Malware Detection and Classification.
Proceedings of the IEEE World AI IoT Congress, 2024

Open Platform Infrastructure for Industrial Control Systems Security.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

2021
Assessing Competencies Using Scenario-Based Learning in Cybersecurity.
J. Cybersecur. Priv., September, 2021

The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study.
Inf., 2021

2020
Integrating Blockchain Technology in Healthcare via Active Learning.
Proceedings of the 2020 ACM Southeast Conference, 2020

2018
A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems.
Proceedings of the Computer and Network Security Essentials., 2018

2015
A Consensus of Thought in Applying Change Management to Information System Environments.
Int. J. Inf. Syst. Model. Des., 2015

2014
Laboratory projects for embedded and control systems security.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

2013
A Formal Framework for Patch Management.
Int. J. Interdiscip. Telecommun. Netw., 2013

Enhance computer networks learning with hands-on mobile device based labware (abstract only).
Proceedings of the 44th ACM Technical Symposium on Computer Science Education, 2013

2012
Security fuzzing toolset.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

Wireless vulnerability of SCADA systems.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Critical infrastructure security curriculum modules.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

2009
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy.
Int. J. Inf. Secur. Priv., 2009

Applied Data Mining in a Scholarship Program.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009

Security Metrics-Review and Research Directions.
Proceedings of the 2009 International Conference on Security & Management, 2009

2007
The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise.
J. Digit. Forensics Secur. Law, 2007

An Empirical Study on the Performance of Java/.Net Cryptographic APIs.
Inf. Secur. J. A Glob. Perspect., 2007

An efficient packet loss recovery methodology for video-over-IP.
Proceedings of the Signal and Image Processing (SIP 2007), 2007

Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
Visualization and management of digital forensics data.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

Steganography obliterator: an attack on the least significant bits.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

2005
Wireless Security Tools.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Computer Forensic Tools and Techniques.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
An Intelligent RFID Based Wireless Tools and Asset Tracking System.
Proceedings of the International Conference on Wireless Networks, 2004

Network Performance Measurement Tools.
Proceedings of the International Conference on Communications in Computing, 2004

2003
A Wireless Maintenance Identification System.
Proceedings of the International Conference on Wireless Networks, 2003

A Wireless Sensor Network.
Proceedings of the International Conference on Wireless Networks, 2003

A Performance Comparison of Encryption Algorithms.
Proceedings of the International Conference on Security and Management, 2003

2000
Derivation and Visualization of the Binomial Theorem.
Int. J. Comput. Math. Learn., 2000


  Loading...