Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep...

40
March 2015 Mario A Garcia Professor Department of Computing Sciences Texas A&M University-Corpus Christi Center for Instruction # 331 [email protected] 6300 Ocean Dr. phone: (361) 825 3478 Corpus Christi, Texas 78412 fax: (361) 825-2795 Current Position: Professor Academic Preparation Postdoc - University of Maryland University College UMUC Information Assurance. 2006-2007 Certificate - Carnegie Mellon University- Information Assurance. Summer 2003 Certificate - Purdue University - Information Assurance. Summer 2004 Ph.D. Texas A&M University. Computer Science - Dissertation Title: "Intelligent Agents Applied to Software Management" August 1997. M.S. Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) - Computer Science.: Dissertation Title: "Methodology to Diagnose Alarms Using a Real Time Expert System" July 1991. M.S. Instituto Tecnologico de la Laguna. - Electrical Engineering: Thesis Title: "Set Theoretical Control" December 1980. B.S. Instituto Tecnologico de Saltillo - Electrical Engineering: Thesis Title: "Using Sparse Matrix for the Analysis of Electrical Circuits" June 1979 Professional Experience 2014 Visiting Scientist June – August. Lawrence Livermore National Laboratory 2013 Visiting Scientist June – August. Lawrence Livermore National Laboratory 2012 Visiting Scientist May – July Naval Undersea Warfare Center Newport RI

Transcript of Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep...

Page 1: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

March 2015

Mario A Garcia Professor Department of Computing Sciences

Texas A&M University-Corpus ChristiCenter for Instruction # 331

[email protected] Ocean Dr. phone: (361) 825 3478Corpus Christi, Texas 78412 fax: (361) 825-2795Current Position: Professor

Academic PreparationPostdoc - University of Maryland University College UMUC Information Assurance. 2006-2007Certificate - Carnegie Mellon University- Information Assurance. Summer 2003Certificate - Purdue University - Information Assurance. Summer 2004Ph.D. Texas A&M University. Computer Science - Dissertation Title: "Intelligent Agents

Applied to Software Management" August 1997.M.S. Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) - Computer

Science.: Dissertation Title: "Methodology to Diagnose Alarms Using a Real Time Expert System" July 1991.

M.S. Instituto Tecnologico de la Laguna. - Electrical Engineering: Thesis Title: "Set Theoretical Control" December 1980.

B.S. Instituto Tecnologico de Saltillo - Electrical Engineering: Thesis Title: "Using Sparse Matrix for the Analysis of Electrical Circuits" June 1979

Professional Experience2014 Visiting Scientist June – August. Lawrence Livermore National Laboratory2013 Visiting Scientist June – August. Lawrence Livermore National Laboratory2012 Visiting Scientist May – July Naval Undersea Warfare Center Newport RI2011 Visiting Scientist July – August Naval Undersea Warfare Center Newport RI

Visiting Scientist - June Educational Testing Service (ETS) Princeton NJ. 2010 Visiting Scientist June – July University of California at Berkeley2008 - Visiting Scientist Monterrey Tech. ITESM – Mexico June – August 2082006 - Visiting Scientist Stanford University June – August 20062005 - Visiting Scientist CERT/SEI/CMU Carnegie Mellon University June – August 2009 - Adjunct Full-Professor – University of Maryland University College (online)2009 - Professor Texas A&M University Corpus Christi – Computer Science2004-2009: Associate Professor Texas A&M University Corpus Christi – Computer Science1999-2004: Assistant Professor Texas A&M University Corpus Christi – Computer Science1998-1999: Assistant Professor Instituto Tecnologico y de Estudios Superiores de Monterrey 1996-1997: Lecturer Texas A&M University Department of Computer Science1994-1996: Research Assistant Texas A&M University Department of Computer Science 1993-1994: Research Assistant Texas A&M University Forest Science Department1988-1991: Research Assistant Instituto Tecnologico y de Estudios Superiores de Monterrey 1979-1988: Professor National System of Technological Institutes. 1982-1983 Professor, Electrical Engineering, National University of Mexico (UNAM).

Page 2: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

Administration 1987-1988 Professor and Sub-Director, Tecnologico de Saltillo, Saltillo Mexico.1986- 1987 Professor and Sub-Director, Tecnologico de San Luis, San Luis Potosi Mexico 1983-1986 Professor and Sub-Director, Tecnologico de Piedras Negras, Piedras Negras

Coahuila Mexico 1982-1983 National Coordinator of Electrical Engineering. National System of Technological

Institutes, Mexico City.

TeachingUniversity of Maryland University College: INFA650 -9041

Graduate: Introduction to Computer Forensics August 2006 - PresentTexas A&M University Corpus Christi

Graduate: COSC 5311 Fundamentals in Programming and Problem Solving I; COSC 5312 Fundamentals in Programming and Problem Solving II; COSC 5320 Design and Implementation of Computer Instructional Systems; COSC 5321 Data Structures; COSC 5325 Foundations of Software Engineering; Advanced Software Engineering; COSC 5348 Expert Systems; COSC 5354 Artificial Intelligence; COSC 5374 Computer Forensics (course developed); COSC 5375 Information Security (course developed); COSC 5376 Network Security (course developed); COSC 5377 Wireless Security (course developed); COSC 5378 Survivable Systems (course developed); COSC 5379 Advanced Information Assurance (course developed). COSC 5590 Selected Topics: Wireless Security(course developed . Advanced Artificial Intelligence (course developed) Ethical Hacking (course developed);

Undergraduate: COSC 1436 Introduction to Problem Solving with Computers II; COSC 2437 Data Structures; COSC 2470 COBOL; COSC 3353 Survey of Programming Languages COSC 3370 Software Engineering; COSC 3380 Undergraduate Research Experience; COSC 4310 Digital Forensics (course developed); COSC 4430 Artificial Intelligence; COSC 4354 Systems Analysis and Design (Capstone course). Computer Architecture. Tecnologico de Monterrey (ITESM)

Reasoning and Search Systems, Artificial Intelligence, Practical Training.Texas A&M University

Artificial Intelligence, Software Engineering, Fortran 90.Tecnologico de Saltillo

Electrical Power Systems, Control Theory 1, Control Theory II, Logical CircuitsExpert Systems, Artificial Intelligence, Software Engineering, Software QualityData Structures, Pascal, Discrete Mathematics, Analysis of Algorithms

Graduate Projects Committee Chair (Completed)1. Shivani Reddy Atigada. A Collaborative Filtering Recommendation Algorithm based on

User Clustering and Item Clustering. November 12, 2014. 2. Ranjith Kumar Bodla. Implementation of a Prototype for Secure Online Payment System

Using Discrete Cosine Transformation and Permutative Stradding. November 12, 20143. Srilaxmi Gandra. Cyber Card Detection and Prevention System for Ecommerce.

November 2014. 4. Ricardo A. Garcia. Computer Forensics: Password Recovery Tool using Odroid-XU

Implementation. November 24, 2014

Page 3: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

5. Mohammed Shahid Sultan. Detecting HTTP based Botnet Command and Control Channels in Network Traffic using BotSniffer. December 1, 2014.

6. Yellu Sirisha.7. Goddam Bharath Simha Reddy . Securly Sharing Multimedia Files Over Internet Using

Cryptography and Partial Steganography. December 1, 2014.8. Haritha Devulapally. Implementation of an Android Application to help users Recover

and Secure a Lost Phone. July 20149. Anurag Reddy Muppidi. An Android Application to Integrate and Secure Social

Networks and Emails. July 2014.10. Pratyusha Adasumalli. Implementation of an Android Application to Retrieve Information

from a Lost Android Device. Spring 2014. 11. Naga Sandeep Thatipally. Implementation of an Application Using Third Party Auditor

for Secure Cloud Storage. Spring 201412. Pavithra Roscillini Bandela. Implementation of an Android application to enhance

security in Social Networks. Spring 201413. Sumanth Minnakanti. Hiding information in Audio, video, and Images Using

Steganography. Spring 201414. Swetha Davana. Implementation of an Application to Secure Personal data Using

Enhanced Data Encryption Standard. Spring 2014. 15. Sachin Samrat Medavarapu. Improving The Efficiency of Packet Marking Using Modulo

Operation. July 2013. Thesis 16. Tingh Trun Applying  Back-Propagation Artificial Neural Networks to detect Attacks in

Computer Networks. April 9, 2013 – Thesis 17. Aditya Cheruvu “Email Spam Detector: A Tool to Monitor and Detect Spam Attacks”

December 2012.18. Santosh Kumar Reddy Yerramorusu “Secure Calls and SMS Logs” December 201219. Anuudeep R. Kandi “Design and Implementation of a tool to help Computer Forensics

Instructors to Demonstrate Common Data Hidden Techniques” December 201220. Ashwini M. Achar. Design and Implementation of Software Tool to Detect and Prevent

Access to Malicious Users attacked by Cross-Site Scripting Attack. August 6, 201221. Vamshi Krishna Eranti Implementation of Hop-based Packet Marking for IP Traceback.

August 2, 2012.22. Nithisha Repaka. Tool for Implementation of Strategies to detect Botnet Attacks August

2012.23. Deepthi Jambula. Implementation of a Prototype to Detect Network Attacks by Analyzing

Irregular User Behavior. August 2012.24. Stephen Smith. Tightening the Net: Examining and Demonstrating Commonly Available

Network Security tools. April 2012.25. Ramchander Mudu. Design and Implementation of a Visualization System to Prevent

Cheating in Online Tests. April 24, 2012.26. Ankush Vee. Evaluation of Cloud Security Using Firewalls. April 24, 2012.27. Kartik Konnarraju. Data Security in Cloud Computing Using Encryption. April 25, 2012.28. Rahul Guija. An Attacker Agent Identification Tool in Data Distributed Systems. April

25, 2012.29. Santosh Kumar Birkur. Link Failure Detector and Simulation of Metrics in Distributed

Network. April 26, 2012.

Page 4: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

30. Maria Anurag Basani. APuzzle-based Authentication Method with Serer Monitoring. April 26, 2012.

31. Pradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012.32. Arun Kumar Ankam. Implementation of a Tool o Conduct Live Forensics Acquisition in

Windows Systems. April 2012.33. Kamalendar Kotha. Visual Cryptography Tool For Embedded Halftone Shares. May

2012.34. Sudheer Chennuri. Integrated Forensics Tool for Web Browser Analysis. May 2012.35. Srikanth Padakanti. Rootkits Detection Using Inline Hooking. May 2012.36. Kalyani Suram. Analysis, design and implementation of a password cracking tool May

2012.37. Divya Tara Puvvula. Implementation of a tool for Detecting and filtering Spam. May

2012.38. Sai Saran Tockachichu. Virtual Environment based training material for Computer

Forensic Investigations May 2012.39. Linh Manh Pham Real-Time Web-based Hyperspectral Data Viewing and Modeling.

December 1st, 2011.40. Farath Fatima Detection of DataBase Attacks Using Computer Forensics Tools.

December 6, 2011.41. Anusha Gollapudi. Web Log Analyzer. December 9, 201142. Sravani Pedamallu. Implementation of an Enhanced Hidden Markov Model in Detecting

Crediting Card Frauds. December 9, 2011.43. Anusha Pesaru. Analysis, Testing, and Comparison of Open Source Encryption Tools.

December 13, 201144. Soumya Mitakanti – Forensics Analysis of the Lustre file System July 22, 2011 45. Rakesh Sambhuni – Checking the Security of a Website using a Phishing Website

Detector July 22, 201146. Drhuja Druthi – Forensics Analysis and Trusted monitoring System Prototype

Implementation in Cloud Computing . June 1, 201147. Pretthi Chitimalla – Steganography via Sound Effects in Power point Files June 1, 201148. Raja Mallepally Implementation of Applications to Improve iPhone Forensics Analysis

and Integrity of Evidence. June 2, 201149. Ragu Deshu – Implementation of a Tool to Defend Wireless Networks against

unauthorized Access. May 201150. Shravya Lanka – Enhancing Forensic Investigations in Large Capacity Storage Devices

using WEKA: A Data Mining Tool. May 201151. Chaitanya Chinthireddy – Implementation of an Intrusion Detection System based on

SNORT rules and using the Expert System tool Jess. May 201152. Midhula Thota. Social Networks Forensics. May 201153. Satish Mallepaly – Design and Implementation of WIN-RM (Windows registry Monitor)

forensic Tool. May 201154. Srikanth Kotha – ENCACHARE: An Anti-forensics tool to Encrypt, Camouflage,

Change, File properties, and Rename files. May 201155. Ruth Hardening . A Forensics Investigation of Windows Registries December 1, 201056. Jose Javier Escobar A Forensics Analysis of Network Security Logs on a Virtual

Environment. December 3, 2010

Page 5: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

57. Barath Kumar Paravastu Design and Implementation of a Wireless Packet Sniffer. November 22, 2010.

58. Sandeep Aluvaka. Implementation of a Steganalysis tool to detect Steganography in a wireless forensics investigation. November 19, 2010

59. Srilakshmi Erasani. Analysis of Criminal Anti-Forensics Methodology and Anti-Anti Forensics Defense. November 5, 2010

60. Sandeep Kumar Khanikekar Web Browsers Forensic Investigation. November 2, 201061. Vamshi K. Kancheti. Security Analysis of Social Networks. September 20, 2010. 62. Bandela Rini. Intrusion Detection System With Intelligent Agents Techniques. August

201063. Satya Harini Reddy. Analysis, Implementation, and Testing of Anti-Forensics Techniques

May 4, 201064. Urmila Konsam. “Designing Security Architecture and Securing Web Applications using

Secure Sockets Layer (SSL).” December 5, 2008.65. Bhavani Sunke. “Analysis and Hardware Support for Intrusion Detection System Tools.”

December 4, 200866. Gonzalo Villegas. “Analysis of Tools for Conducting Wireless Penetration Testing.”

December 4, 2008.67. Eduardo Arce. “Analysis of Mobile Phone Forensic Software Tools.” December 3, 2008.68. Prashanth Gurrala. “Widgets for Mobile Device.” November 19, 2008.69. Venkata Devarapally. “Survivable Systems and Secure Programming.” November 12,

2008. 70. Suman Paladugu. “Analysis of Mobile Phone Forensic Software Tools” October 16, 2008.71. Rocky Martin. “Bluetooth and JAVA helping Sight Impaired.” May 2, 2008.72. Narayanan Srinivasan. “Web Content Management System for an Online News Service.”

May 9, 2008.73. Kevin Krause. “Introducing Shades of Gray into an Otherwise Black and White World:

The Consideration of Ethics in the Field of Information Assurance.” April 25, 2008.74. Sai Ajay Kummar. “Research, Analysis and Efficiency Measurement of Forensics Tools

and Techniques to Detect Criminal Evidence to be used in a Court of Law.” Fall 2007.75. Kiran Vupala. “Design of Internet Applications for Symbian OS Based Mobiles.” Fall

2007.76. Ramakrishna Reddy Vodeti. “Study of Intrusion Detection Tools to Avoid Phising.” Fall

2007.77. Anthony Weitekamp. “Derivation of Symmetric Encryption Keys From Synchronized

Chaotic Systems.” Spring 2007.78. Veera Kishore Reddipalli. “Design and Analysis of Intrusion Detection Using

Honeypots.” Fall 2006.79. Ramya Chakinarapu “Programming a Controller for Video Conversion and Text Data

Overlay.” Fall 2006. 80. Jayanthi R. Kalvemula. “Research, Analysis and Efficiency Measurement for E-mail and

SPAM Detection/Prevention.” Fall 2006.81. Lakshami Pinneti. “Detection and Identification of Bacterial and Parasitic Pathogens in

Fish Husbandry using Web-based Expert Systems.” Spring 2006.82. Vamshi Kankanala “Web-based Network Intrusion Detection Expert System.” Spring

2006.

Page 6: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

83. Satrunga Pakala “Using Biometrics to Generate Public and Private Keys .“ Spring 2006.84. Firoz Allahwali. “Implementation of an Offline Intrusion Detection System Using Data

Mining.” Spring 2006.85. Ankita Nellimarla. “Biometric Authentication Tool for User Identification Based on

Keystroke Dynamics.” Summer 2006.86. Ramesh Krishnamoorthy. “Active Change Auditing and Integrity Verification System

using MD5 Hashing.” Summer 2006.87. Randy Cisneros. “Dictionary Attack Method for UNIX Systems Using Salt.” Fall 200588. Jasbir S. Parmar. “Network Intrusion Detection Using EagleX and Securepoint Nuzzler.”

Fall 2005.89. Carl J. Perales. “Development of a Hybrid Knowledge-Based Training System for

Heating, Ventilating, and Air- Conditioning (HVAC) Load Calculations.” Fall 2005.90. Karthik Duraisamy “Design and Implementation of a Visualization Statistical and

Analysis Tool for Comparison of Atmospheric Model Predictions of the Golf of Mexico.” Fall 2005.

91. Shiraz Ahmed “Electronic Learning in Nursing Education.” Fall 2004.92. Aijaz Ahmed “Signature-based Network Intrusion Detection System using JESS.”

Spring 2004.93. Norma N. Nolazco. "Data Mining in Real World Database Application" Summer 2003.94. Brian McCord. “Using Neural Networks and Genetic Algorithms to Predict Stocks.”

Summer 2003.95. Allen J. Brotze “An Expert System for Training Medical Students.” Fall 2006.96. Eunjoon Hwang. "Image Fusion." Fall 2003.97. Jeremy D. Zapata. “A Learning Aggregator - A Bayesian Classification System for

Online Syndication.” Fall 200398. Leonardo F. Duarte "Web-Based Expert System for Diagnosis and Treatment of

Diabetes." Fall 2002. 99. Carlos Mendieta- "A Comparison of Artificial Neural Network Models for Predicting

Tide Levels." Fall 2001. 100. Tinu Singh. "Prototype Expert System for Diagnosis and Treatment of Diabetes."

Spring 2001. 101. Sreevani Pelala. “Robot Path Generator”. Fall 2000.

Graduate Projects Committee Member (Completed)1. Himavarsha Surabi. Hybrid Model for Intrusion Detection using Data Mining Spring

2014. 2. Rakesh Kumar Srirangam. A Novel Steganographic Tool for Multilevel Protection 3. Anusha Pesaru – Extracting Social Behavior from Social Networks. December 13, 20114. Sharath Ranga Probabilistic Top-k Query Processing Using Central Limit Theory. July

23, 20115. Diana M. Rojas: Integrating Threat Modeling in the Secure Agent-Oriented Software

Development. December 2010 6. Archana Gudala: A Holistic Schema Matcher Application. December 2, 20107. Bo Dong. A Novel SemiDefinite-Based Localization System: Design and Evaluation.

Summer 20098. Rajesh Kanisetti. “Voice Interactive Internet Browser.” Spring 20099. Sreekrishna Nallela. Probabilistic Discovery of Motif’s in Primary Water Levels” 2009

Page 7: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

10. Yashwanth Chintala. “Extracting the Semantic Structure of Web pages Using the Visual Based Segmentation algorithm” December 3, 2008

11. Francisco Fonseca. “ Wireless Security” December 2, 200812. Srujan Kothapally – Data Integration for the Gulf of Mexico Satellite Observations.

November 24, 200813. Joseph Nalluri. Peer to Peer Database Integration using Piazza. September 25, 2008.14. Sumit Agarwal. “Machine Translation.” Fall 2007.15. Sheshidhar Odeti. “Wave Steganography.” Fall 2007.16. Hemanth Gowda Krishnappa. “Fingerprint Verification using Mutual Information.” Fall

2007.17. William J. Shelton Design of a Face Recognition Subsystem for Use in a Digital Photo

Album. Spring 2007.18. Randy DeLeon. “Securing Sensitive Information in Cookies.” Spring 2007.19. Felix Fuentes. “Biometrics and Vein Map Authentication.” Spring 2007.20. Himanshu Pundir “Immediate Assessment of a Class Lecture Using a Handheld Device.”

Spring 2006.21. Naresh Kumar Peapully Shroff. “Task Management System on Pocket PC.” Fall 2005.22. Ashwani Tomar “Mapping and Monitoring of LiveOak Peninsula Area.” Fall 2005.23. Kiran Jana. “Design and Implementation of Online Grading & Tracking System.” Fall

2005.24. Gnan Mekala “Task Management System.” Fall 2005.25. Bindu Yaparla. "Resource Management System for Disability Students." Spring 2005.26. Bhargavi Hiremagalur. “WLAN Traffic Grapher Using Simple Network Management

Protocol (SNMP).” Fall 2004.27. Krishna Reddy Dagula. "WinFind, A Tool to Measure the Bandwidth of Asymetric Links

on Internet." Fall 2003.28. Raghavendra P. Desiraju. "The Design and Implementation of a Cashier System." Fall

2003.29. Sae Hwang. "The Design and Implementation of a Virtual Engineering Technology

Laboratory." Fall 2002.30. Abhijeet Trivedi. "Read, Review & Assess System." Spring 2002.31. Kevin Nelson. "An Automated System for Administering and Scoring the Case Strategies

for Case Supervision Assessment Instrument." Fall 2001.32. Rui Shen. "Design and Implementation of WinTrace: An Internet Path Characterization

Tool." Fall 2001.33. Matthew Johnson. "Development of an Intelligent Autonomous Robotic System Using a

Hybrid Control Architecture and Enhanced Topological Mapping." Fall 2001.34. Tao Huang. "Personal Investments-Assistance System." Summer 2001.35. Ying Shen. "Online Indexed Reflection/Collection Student Notebook Structure."

Spring 2001.36. Sean Babcock - "Clips to C Interface for Mobile Robot Control." Fall 2000.37. Shekar C. Gudi. "Design of an Automated Natural Language Processing Algorithm for

an Industrial Environment." Summer 2000.38. Kelly Mierzwa Todorov. "Medical Manager Word-Processing Interface." Spring 2000

Continuing Education

Page 8: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

1. Parallel Computing TotalView Debugger. 7/19/2013. Lincoln Livermore National Laboratory

2. Parallel Computing POSIX Threads Programming. 7/18/2013. Lincoln Livermore National Laboratory

3. Parallel Computing Open MP. 7/18/2013. Lincoln Livermore National Laboratory4. Parallel Computing Message Passing Interface. 7/17/2013. Lincoln Livermore National

Laboratory5. Parallel Computing Moab. 7/17/2013. Lincoln Livermore National Laboratory6. Introduction to Parallel Computing. 7/15-16/2013. Lincoln Livermore National

Laboratory7. Black Hat Conference – Las Vegas Nevada – July 30 – August 4 20118. DEFCON Hackers Conference – Las Vegas Nevada August 6 – 8, 20119. Black Hat Conference – Las Vegas Nevada – July 28 – 29 201010. DEFCON Hackers Conference – Las Vegas Nevada July 30 – August 1 201011. University of Berkeley: Summer 201012. Fourth Annual Department of Homeland Security (DHS) University Network Summit

held March 10-12, 2010. Washington DC.13. CERIAS Information Assurance Symposium. Purdue University. March 30 – April

1,2010. West Lafayette, Indiana14. Information Assurance and Security Ethics Workshop. March 28 – 20, 2010 Purdue

University. 15. Minority Serving Institutions Technical Assistance – Capacity Building Conference.

September 21-24, 2009. Dallas Texas. 16. Rochester Institute of Technology – June 22-25, 2009 Information Assurance Boot Camp17. Rochester Institute of Technology – Summer 2007 – Information Assurance Boot Camp18. Access Data Boot Camp (Windows Registry) Corpus Christi TX, December 19 – 21,

2007. (Online)19. Learning to Teach Online using the tool WebTycho. University of Maryland University

College. August 19 – September 23, 2007.20. Information Assurance Workshop. Rochester Institute of Technology. August 6–17, 2007.21. The Women's Institute in Summer Enrichment (WISE). Workshop on Sensor Networks.

Berkeley University. Berkeley Cal. June 10 - 16 2007.22. Summer Workshop On Teaching about Terrorism (SWOTT).  Morehouse College in

Atlanta, Georgia, June 17-23, 2007.23. Affinity Research Group Workshop. Corpus Christi TX, May, 2007.24. Access Data Boot Camp (Forensics Tool Kit FTK) Portland Or. May 8–10, 2007.25. TRUST Team for Research in Ubiquitous Computing. Workshop Spring Retreat. Oakland

Ca. March 19 – 20, 2007.26. Joint NASA/NSF Conference for Higher EducationPrincipal Investigators, Faculty, and

Partners, Chantilly, VA.February22-24, 2007.27. TRUST Team for Research in Ubiquitous Computing. Workshop Fall Retreat. Pittsburgh

Pa, October 5 – 6. 2006.28. The Women's Institute in Summer Enrichment (WISE). Workshop on Ubiquitous Secure

Technology . Berkeley University. Berkeley Cal. July 5 – 11 2006.29. 2nd Trustworthy Interfaces for Passwords and Personal Information workshop. Stanford

University. Palo Alto Cal. June 19, 2006.

Page 9: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

30. EnCase Incident Response, Forensic Analysis and Discovery. Guidance Software – Pasadena CA. November 15 – 18, 2005.

31. Software Engineering “SSI-Hub” Workshop. Texas A&M University. College Station, TX. August 24-26 2005.

32. Symposium On Usable Privacy and Security (SOUPS 2005). Carnegie Mellon University. July 12-14, 2005.

33. CISCO Security Professor Professional Development. CISCO Security Boot Camp. Carnegie Mellon University, July 14-19, 2005.

34. Workshop on Case Studies Teaching in Science. Buffalo New York, May 14 – 21, 2005.35. The Learning Paradigm College. Texas A&M University-Corpus Christi. April 8 – 9

2005. 36. Information Security for Network Managers. Carnegie Mellon University – Software

Engineering Institute. July 13 – 14, 2005.37. Ethics in Computer Science. San Diego California. February 23 – 27 2005.38. FASEB Grantsmanship Training Program Atlantic Beach, Florida April 28 – May 1,

2004.39. Assessing NASA’s Educational and Research Funding Opportunities. San Antonio TX,

April 26 2004.40. Information Assurance Education Graduate Certificate Program at Purdue University.

West Lafayette, Indiana. June 14 – August 6 2004. 41. Advanced Information Security for Technical Staff. Carnegie Mellon University –

Software Engineering Institute. May 10 –14 2004.42. Information Security for Technical Staff. Carnegie Mellon – Software Engineering

Institute. March 29 – April2, 2004.43. CISCO Security Professor Professional Development. CISCO Security Boot Camp.

TAMU-Commerce, Dallas TX, August, 21- 23 2003. 44. Information Assurance Capacity Building Program. Carnegie Mellon University.

Pittsburgh PA, July 6 - August 1 2003.45. Dare to Soar. Cultural Competencies Workshop Managing Diverse Cultures at the Speed

of Change. Corpus Christi, Texas, October 11, 12 2002.46. Introductory Workshop on Computational Science in Undergraduate Education. Texas

A&M University Corpus Christi.July 28 – August 3 2002. 47. Office of the Governor Budget and Planning State Grants Team. Writing to Win Corpus

Christi Texas, May 15-17 2002.48. Writing Winning Proposals. San Antonio Texas, 2001.49. Dr. Scheme Workshop. Texas A&M University-Corpus Christi, November 29, 1999.50. Java Workshop. Texas A&M University-Corpus Christi. November 12, 1999.

ScholarshipResearch Proposals Submitted Funded

1. Mario A. Garcia. Design Implementation and Testing of a Virtual Forensics Laboratory. NSF-TUES 2012.

2. Mario A. Garcia Analysis of Mobile Devices Forensics Tools” Texas Research Development Fund. 09/01/2009 – 08/30/2010 $24,000

3. Mario A. Garcia. “Use of Cell Phones to give Location Information to Blind People.” Texas Research Development Fund. 09/01/2008 – 08/30/2009. $25,000.00

4. Co-PI, “Computing Infrastructure for Research-Based Learning (CIRBL)”, National Science Foundation (NSF). PI: John Fernandez, Co-PIs: Mario Garcia, Dulal Kar, Scott

Page 10: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

King. (9/2007-8/2010) (NSF agreed to award $650,000.00) – Garcia: Money used for a graduate research student.

5. Ahmed Mahdy and Mario A. Garcia – Texas Research Development Fund –$34,900.00 September 2007 – August 2008. On-The Move Secure Broadband Wireless Networks for Future Digital Battlefields. Garcia: Money used for a graduate research student and one month of salary.

6. Mario A Garcia – Department of Homeland Security/University of Maryland University College – Information Assurance Fellowship $30,000.00 (Postdoc on Information Assurance) July 2006 – December 2007.

7. Mario A. Garcia – NSF/Quality Education for Minorities (QEM) Fellowship. Faculty Summer Appointment Award $11,000.00 June – August 2006.

8. Melissa Dark, Nathan Harter, Linda Morales, and Mario Garcia. Collaboration: Ethics Education in Computing – A moral Development/ Constructivist Approach. January 2006 – December 2009. $230,000.00. NSF Ethics in Science and Engineering (EESE) . Garcia $45,000.00. Chapters on How to teach Information Assurance Ethics.

9. Stephen Dannelly, Dulal Kar, Mario Garcia, John Fernandez., NSF CISE MII 2003: Extending and Strengthening the Pipeline in Computer Science. September 2003 – August 2008. $1,499,997.00. Garcia: Implementation of the Digital Forensics Lab, Implementation of the Network Security Lab.

10. John Fernandez, Mario Garcia, and Dulal Kar. CISCO. $62,901.00. Hardware donated to Texas A&M University-Corpus Christi. September 1, 2003

Mini-Grants11. Mario A. Garcia Educational Testing Service Faculty Fellowship – Princeton NJ June

201112. Mario A. Garcia ASEE – ONR Faculty Fellowship Navy Undersea Warfare Center

Newport RI, July August 201113. Mario A. Garcia Faculty Fellowship Summer Institute Program in Israel. June 9 – 17,

2010. 14. Mario A. Garcia – Texas Research Development Fund – “Using Artificial Neural

Networks and Statistics for the Creation of a Computer Network Intrusion Prevention Model” $8,000.00 September 2006 – August 2007.

15. Ahmed Mahdy and Mario A. Garcia – Texas Research Development Fund – “Securing, Extending and Levering City WiFi Networks: The Pioneer Corpus Christi Case” $33,1500.00 September 2006 – August 2007.

16. Mario A. Garcia – College Research Grant - $3,000.00 September 2006 – August 2007.17. Mario A. Garcia. WISE Fellowship for the WISE 2007: Women Institute in Summer

Enrichment program at the University of California, Berkeley. June 10- 16, 200718. Mario A. Garcia. Department of Homeland Security Fellowship to attend the Summer

Workshop On Teaching about Terrorism (SWOTT).  Morehouse College in Atlanta, Georgia, June 17-23, 2007.

19. Mario A. Garcia. Enhancing Security in the Corpus Christi Wireless Network. $3,000.00 College Research Enhancement Program. April 20, 2007

20. Mario A. Garcia. Mini-grant award for participation in the Joint NASA/NSF Conference for Higher Education Principal Investigators, Faculty, and Partners, Chantilly, VA.February 22-24, 2007.

21. Mario A Garcia. Security Workshop.  Bethlehem PA, August 4-5th, 2005. $1,000.0022. Mario A Garcia. TAMU-CC Science and Technology Scholarships Fall 2004 $ 5,000.00

Page 11: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

23. Mario A Garcia. TAMU-CC University Research Grant. November 2004. $ 6, 411.0024. Mario A Garcia . TAMU-CC College Research Grant. September 2004. $3,000.00 25. Mario A. Garcia. NSF SFS Information Assurance Workshop – Rochester Institute of

Technology August 6 – 17, 2007. $3,000.00 26. Mario A Garcia . TAMU-CC College Research Grant. September 2003. $2,000.00 27. Mario A. Garcia. Information Assurance Grant. - Carnegie Mellon University. Pittsburgh

PA. July - August 2003. $7,666.0028. Mario A. Garcia. Federate Computing Research Grant - San Diego Cal. June 2003.

$1,000.0Journal Publications

1. Pham M. L., Garcia M., and Mehrubeoglu R. “Real Time Control We-based Hyperspectral Imaging System” IEEE Transaction on Computers. Submitted January 31, 2012

2. Garcia M., and Paravastu B. Packetxtract: A Wireless Traffic Sniffer. Submitted to the International Journal of Network Security. January 15, 2012

3. Bachnak R., Chakinarapu R., Garcia M., and Kar. D. “A System for Video Conversion and Text Data Overlay.” WSEAS Transactions on Circuits and Systems. ISSN 1109-2734 Issue 1, Volume 7, January 2008. Pp. 39-48.

4. Dark M., Morales L., Harter N., and Garcia M. “An Information Assurance Ethics Education Model.” The Journal of Computing Sciences in Colleges. 2008 pp. 82-88.

5. Phillip Ian Wilson P. I and Garcia M. “A Modified Version of the Vigenere Algorithm” IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2, February 2006.

6. Hytnen R. and Garcia M., “An Analysis of Wireless Security.” The Journal of Computing Sciences in Colleges. 2006 pp. 210 – 216.

7. Fernandez J., Evans A., Camacho D., and Garcia M. “Software Engineering Industry Experience – The Key to Success” The Journal of Computing Sciences in Colleges. 2006 pp. 230 – 236.

8. Garcia M. Cisneros R, and Bliss D. “Password Auditing Applications” The Journal of Computing Sciences in Colleges. 2006 pp. 196 – 201.

9. Fernandez J, Smith S, Kar D, and Garcia M. “Computer Forensics – A critical need in Computer Science Programs ” The Journal of Computing Sciences in Colleges. Vol., Number 4 pp. 315 – 322 April 2005.

10. Dannelly S, Steidley C, Pelala S. and Garcia M. “Robots and Search Algorithms: Real-World Applications for Students.” Computer in Education Journal. Vol. XIV NO. 2 April – June 2004.

11. Johnson M and Garcia M. “Implementation of Three Robotic Control Architectures for Robot Navigation." The Journal of Computing Sciences in Colleges. Vol. 18, Number 4. pp. 38 – 47 April 2003.

12. Starek M, Garcia M. and Tomer M. “An Expert System for Mineral Identification.” The Journal of Computing Sciences in Colleges. Volume 17, Number 5. pp.193-197. April 2002.

13. Garcia M, A. Gandhi, T. Singh,L. Duarte, R. Shen, M. Danthu, S. Ponder, and H. Ramirez. “ESDIABETES An Expert System in Diabetes.” The Journal of Computing Science in Small Colleges. Amarillo, Texas. April 6-7, 2001. Vol. 16, Number 4. pp 166 – 175.

Page 12: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

14. Garcia M. “Education in the Century XXI.” The Journal of Computing Science in Small Colleges. Volume 15, Number 3 pp.16-24. April 2000.

15. Cantu-Ortiz, F., and Garcia-Espinosa M. (1992). “An Expert System for Diagnosing Problems in Boiler Operation.” Expert Systems with Applications: An international Journal, Pergamon Press, 5(3-4), pp 323-336, 1992

Publications (Peer-Reviewed)1. Garcia M. Applications of Artificial Intelligence to Intrusion Detection. San Jose state

University. April 18, 2014. 2. Garcia M and Mallepally R. “Applications to Improve IPhone Forensics” Accepted for

publication at the 28th International Conference on Computer and Their Applications CATA 2013. Honolulu Hawaii. March 4 – 6 2013

3. Garcia M and Mudu R. “Design and Implementation of a Visualization System to Prevent Cheating in Online Testing” Accepted for publication at the E-Leader International Conference. Singapore, January 2-4 2013.

4. Garcia M and R Sambhuti. “Phishing Web Sit Detector for Improving Network Security” Accepted for publication and presentation at the E-Leader Berlin Conference June 2-4 2012

5. Garcia M and Pedamallu S. “Implementation of an Enhanced Hidden Markov Model in Detecting Credit Card Frauds” Accepted for publication and presentation at the E-Leader Berlin Conference June 2-4 2012

6. Garcia M and Rini B. Network Intrusion Detection Using Intelligent Agents. The 2011 International Conference on Security and Management (SAM'11: July 18-21, 2011, Las Vegas USA). 23 % acceptance rate.

7. Garcia M, and Mallepally R. Implementations of Applications to Improve iPhone Forensics Analysis & Integrity of Evidence. Techno Forensics Conference. Myrtle Beach, SC. October 31 – November 1, 2011

8. Vodeti R, and Garcia M. Spoof Guard: An Internet Tool Used to Prevent Identity Theft. E-Leader International Confeence. Budapest Hungary June 7-10, 2010

9. Krause K, and Garcia M. “Study of Ethics in Information Assurance” E-Leader International Conference. Tallin Estonia. June 8-10, 2009. http://www.g-casa.com <http://www.g-casa.com/> , ISSN 1935-4819.

10. Krause K, and Garcia M. “The Information Assurance Ethics Dilemma” E-Leader International Conference. Tallin Estonia. June 8-10, 2009. http://www.g-casa.com <http://www.g-casa.com/> , ISSN 1935-4819.

11. Villegas G, and Garcia M. Analysis of Tools for Conducting Wireless Penetration Testing. Accepted for Publication at the Symposium on Privacy and Security Applications. PASST-09 Vancouver CA. August 29-31, 2009

12. Villegas G, and Garcia M. Wireless Penetration Testing. Proceedings of the Symposium on Privacy and Security Applications. Twenty-Fifth Annual Computer Security Applications Conference (ACSAC). Honolulu Hawaii. December 7-112009

13. Arce E. and Garcia M. “Use of Forensic Software Tools to Acquire Evidence from Mobile Devices” Proceedings of the The 2009 International Conference on Security and Management (SAM’ 2009). Las Vegas NV. July 13- 16, 2009 pp.

14. Garcia M., and Krause K. “Relevance of Ethics in Information Assurance” Proceeding of the VI International Conference on Engineering Education. March 8-11, 2009. Buenos Aires Argentina.

Page 13: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

15. Garcia M., Villegas G., and Alves S. “Wireless Penetration Testing.” Accepted for publication at the Hawaii International Conference on System Sciences. Waikoloa Big Island, Hawaii. January 5-8, 2009.

16. Fuentes F., Kar. D., and Garcia M. Biometrics and Vein Map authentication” E-Leader Krakow Conference. Krakow Poland - June 9-11, 2008.

17. Weitekamp A, Kar, Garcia M, and Tintera G. “Synchronous Key Generation from Chaotic Systems” Proceedings of the The 2008 International Conference on Security and Management (SAM’ 2008). Las Vegas NV. July 13- 18, 2008 pp. 437-442.

18. Krause K, and Garcia M. “Introducing Shades of Gray into otherwise Black and White World: Study of Ethics in Information Assurance.” Frontiers in Education. Racing Toward Innovation in Engineering Education. Saratoga Springs, New York. October 22-25, 2008

19. Weitekamp A, Kar, Garcia M, and Tintera G. “Symmetric Key Cryptography Using Synchronized Chaotic Systems. Proceedings of the International Multi-Conference on Engineering and Technological Innovation. June 29th – July 2nd, 2008 Orlando Florida. pp. 135 – 140.

20. Garcia M, and Krause K. “The Development of Video Based Educational Materials in Ethics For Information Assurance.” 6th ASEE Global Colloquium on Engineering Education. Istanbul Turkey. October 1 – 4, 2007.

21. Garcia M, and Allawali F. “Using Data Mining to Detect Intrusions in Computer Networks.” 6th ASEE Global Colloquium on Engineering Education. Istanbul Turkey. October 1 – 4, 2007.

22. Bachnak R., Chakinarapu, R. Garcia M., and Kar D., “Programming a Microcontroller for Data Capture and Display,” Proceedings of the 16th Int. Conf. on software Engineering and Data Engineering, SEDE-2007, pp. 276-281, July 9-11, 2007, Las Vegas, NV.

23. Bachnak R. Chakinarapu R. Garcia M, Kar D, and Nguyen T. "Real-Time Acquisition and Display of Data and Video," Proceedings of the 7th Int. Conf. on Signal Processing, Computational Geometry, and Artificial Vision (ISCGAV '07), pp. 233-239, Vouliagmeni, Athens, Greece, August 24-26, 2007.

24. Krause K. and Garcia M. "The Development of Video Based Educational Materials in Ethics for Graduate Information Assurance and Security Curriculum" accepted for presentation and publication at the E-Leader conference, Prague, June 11-13, 2007

25. Krause K. and Garcia M. “Using Case Studies as an Approach to Teach Information Assurance Ethics.” Proceedings of the 8th International Conference on Information Technology Based Higher Education and Training. July 10-13, 2007. Kumamoto, Japan. Pp.135

26. Allawali F. and Garcia M. “Using Data Mining to Detect Intrusions in Computer Networks.” 2007 Proceedings of the ASEE Annual Conference and Exposition . Information Systems Division. June 24-27, 2007. Honolulu Hawaii. AC 2007-173 pp 1- 12

27. Krishnamoorthy R. and Garcia M. “Active Change Auditing and Integrity Verification System Using MD5 Hashing.” 2007 ASEE Annual Conference and Exposition. Information Systems Division. June 24-27, 2007. Honolulu Hawaii.

28. Devi U. K., and Garcia M. “Ethical Hacking.” Accepted for publication at the FIE 2007 Frontiers in Education Conference. Milwaukee, Wisconsin October 10-13, 2007.

Page 14: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

29. Garcia M, Dirks M. and Weatherson M. “How to Defend Against Identity Theft, Phishing, and Web Spoofing” E-LEADER conference. Hong Kong, January 2 – 4, 2007. http://www.g-casa.com/E_Leader_HongKong_Program.htm

30. Garcia M, Cisneros R, and Bliss D. “Password Auditing Tools.” Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 – 12, 2006- pp. 331-338

31. Nerlimarla A. and Garcia M. “Biometric Authentication Tool for User Identification.” Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 – 12, 2006 pp. 287-293

32. Garcia M. and Durasaimy K. “SQL Injection Attacks and Prevention Techniques.” Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 – 12, 2006- pp. 343 -355

33. Garcia M. “How to Defend Against Identity Theft Attacks.” 2006 Alaska Information Assurance Workshop. September 5-6. Fairbanks, Alaska.

34. Mardan M. and Garcia M. "DDoS Attacks Flooding Networks All Over the World" Accepted for presentation at the The 10th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2006. Orlando Fl, July 16-19 2006

35. Garcia M “Network Intrusion Detection and Prevention Using Eaglex & Nuzzler” Accepted for presentation at the The 10th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2006. Orlando Fl, July 16-19 2006

36. Garcia M, and Agarwal S. “What to Teach in Computer Ethics” Proceedings of the 7th International Conference on Information Technology Based Higher Education and Training” Sydney Australia. July 10 – 13 2006

37. Garcia M, Cisneros R, and Bliss D. “Password Auditing Tools.” 2006 ASEE Annual Conference and Exposition. Information Systems Division. June 18-21, 2006. Chicago Illinois.

38. Nerlimarla A. and Garcia M. “Biometric Authentication Tool for User Identification.” 2006 ASEE Annual Conference and Exposition. Information Systems Division. June 18-21, 2006. Chicago Illinois.

39. Garcia M. and Durasaimy K. “SQL Injection Attacks and Prevention Techniques.” 2006 ASEE Annual Conference and Exposition. Computers in Education Division. June 18-21, 2006. Chicago Illinois.

40. Wilson I. P. and Garcia M. “Biometrics as a Cryptographic Key Generator” Hawaii International Conference on System Sciences. January 4 – 7, 2006.

41. Dark. M, Garcia M, Qing, Y, Ghansah I, .Chen J, Lee H, and Shing C. “Adaptation of a State of the Art Computer Forensics Course.” Proceedings of the The 8th International Conference for Young Computer. Beijing University of Technology. Beijin China, September 20-22, 2005.

42. Garcia M, Gopal G., Dick J., Swaminathan P., Sunil K. “Rule-based intrusion detection system based on SNORT.” Network / Computer Security Workshop.  Bethlehem PA, August 4-5th., 2005.

43. Garcia M, Dark M, Yuan Q, Ghansah I, Chen J, Shing C, and Lee H. “Adaptation of a Computer Forensics Course.” Proceedings of the 6th International Conference on Information Technology Based Higher Education and Training (ITHET 2005). July 7 – 9 2005. Dominican Republic.

Page 15: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

44. Hwang E. and Garcia M. “An Image Fusion System” Accepted for presentation at the IASTED International Conference on Artificial Intelligence and Applications (AIA 2005), February 14 - 16, 2005, Innsbruck, Austria.

45. Aijaz A. and Garcia M. “Applications of Artificial Intelligence to Intrusion Detection”Proceedings of the Internet and Multimedia Systems and Applications (EuroIMSA 2005) Grindelwald Switzerland. Paper 462-110 pp. 281- 286 February 21 – 23 2005.

46. Young L. and Garcia M. “Using Recursion to Exploit Buffer Overflow”. IADIS International Conference Applied Computing 2005. Algarave Portugal, February 22 – 25 2005.

47. Tomar A. and Garcia M. “Organic Compounds Qualitative Analysis Expert System” 2005 ASEE Annual Conference and Exposition. Emerging Trends in Engineering Education Division. June 12-15, 2005. Portland Oregon

48. Balasubramanian A. Pundir H. Kankanala V. and Garcia M. “Enforcing Information Assurance Using Biometrics” 2005 ASEE Annual Conference and Exposition . Computers in Education Division. June 12-15, 2005. Portland Oregon

49. Young L. and Garcia M Configuring Modular Hi-Rise Fan Coil Units Using CLIPS. 2005 ASEE Annual Conference and Exposition . Computers in Education Division. June 12-15, 2005. Portland Oregon

50. Pinnenti L., Kankanala V., Chada K. and Garcia M. “Disease Diagnostic Tool Fish Therp for Identification and Detection of Bacterial and Parasitic Pathogens in Fish Husbandry” 2005 ASEE Annual Conference and Exposition. Ocean & Marine Engineering Division. June 12-15, 2005. Portland Oregon

51. Dark M, Yuan Q, Garcia M, Ghansah I, Chen J, Shing C. “Faculty-Curriculum Development: What Works and What Doesn’t.” Secure IT 2005 Conference. San Diego, California. April 19 – 22, 2005.

52. Manson D, Corey S. Fernandez J, Blyzka J, Farkas R, Partwo P, Garcia M “Beyond Bootcamps: A model for ongoing curriculum development collaboration for faculty attending an Information Assurance Bootcamp.” Secure IT 2005 Conference. San Diego, California. April 19 – 22, 2005

53. Young L. Aubuchon M, and Garcia M. “Recursion and Buffer Overflow in C++ Programming.” Proceedings of the Symposium on Computing at Minority Institutions. May 20 – 22, 2004 Orlando Florida. Pp 82 - 88

54. Garcia M, Gujjarlapudi R, and H,. Hatti “Organic Qualitative Expert System.” 2004 American Society for Engineering Education ASEE‘s 3rd annual International Meeting in Beijing, China, Tsinghua University,September 7-10. 2004

55. McCord L, McCord B, and Garcia M. “A Medical Expert System for Moderate Sedation.” Joint meeting of the International Conference on Education and Information Systems, Technologies and Applications (EISTA 2004) and the International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2004). Orlando FL. July 21-25, 2004.

56. Garcia M, Gujjarlapudi R, and H, “Organic Qualitative Expert System.” 2004 American Society for Engineering Education (ASEE 2004) Conference and Exposition Computers in Education Division. Salt Lake City, June 20 -23

57. Clements J, Shelton W, and Garcia M. “An Expert System for Pump Diagnosis” Frontiers in Education Conference (FIE 2004). Savannah Georgia, October 20 – 23

58. Steidley C, Dannelly S., Garcia M, and Pelala S, "Robots and Search Algorithm: Real-World Applications for Students. Proceedings of the 2003 American Society for

Page 16: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

Engineering Education Annual Conference & Exposition. Session 1320. Nashville Tennessee, June 22-25, 2003

59. Steidley C, Dannelly S., Garcia M, and Pelala S, "Robots and Search Methods: Abstraction Through Implementation", Proceedings of the American Society for Engineering Education Gulf- Southwest 2003 Conference, Session 3B, CD-ROM, Arlington, TX, March 2003.

60. Dannelly S., Steidley C., Garcia M., and Pelala S. "Physical World Applications of Search Algorithms for Students" Proceedings of the Fourteenth Annual Consortium for Computing Sciences in Colleges South Central Conference. Jackson, MS. April 11 - 12, 2003 pp. 95 - 104

61. Garcia M and Patterson-McNeill. "Learn How to Develop Software Using the Toy LEGO Mindstorms" 2002 ASEE Annual Conference and Exposition Proceedings. Boston Massachusetts, November 6 - 9 2002. Session S4D. Paper 1644.pdf

62. M. Johnson, Garcia M. Robot Navigation: "Determining the Shortest Path Using Enhanced Topological maps." Accepted for publication in the International Instrumentation, Systems, and Automation South American 2002 conference. Sao Paolo, Brazil, November 19-22

63. M. Johnson, Garcia M. Autonomous Intelligent Robots." Accepted for publication in the International Instrumentation, Systems, and Automation South American 2002 conference. Sao Paolo, Brazil, November 19-22

64. Dannelly S, Steidley C, and Garcia M. "Integrating the use of Sensors in the Curriculum." Accepted for publication in the International Systems and Automation Symposium, April 9-11 2002, Monterrey N.L. Mexico

65. Mendieta C. and Garcia M. "Predicting Primary Water Levels using Backpropagation and General Regression Neural networks. 2002 American Society for Engineering Education (ASEE) Annual Conference and Exposition Proceedings. Session 1532. Paper # 137. Montreal Canada, June 16-19 2002.

66. Starek M, Garcia M, Tomer M, Bhaskar K. " Minerals Identification using An Expert System." 2002 American Society for Engineering Education (ASEE) Annual Conference and Exposition Proceedings. Session 1532. Montreal Canada, June 16-19 2002.

67. Garcia M and Patterson-McNeill. "Learning How to Develop Software Using the Toy LEGO Mindstorms" Accepted for publication in the 7th Annual conference on Innovation and Technology in Computer Science Education (ITiCSE) Denmark, June 24-26, 2002.

68. Mendieta C. and Garcia M. "Comparison of Artificial Neural Networks Models for Predicting Tide Levels." Accepted for publication in the IASTED International Conference on Artificial Intelligence and Applications. Malaga Spain AIA 2002. September 9-12, 2002.

69. Garcia M. “ Blackboard: A WEB-assisted and WEB-Based Instruction Software." Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications. Honolulu Hawaii, August 13-16, 2001. pp. 35- 40.

70. Garcia M, Steidley C. "Intelligent Diabetes Management." 2001 ASEE Annual Conference and Exposition Proceedings. Session 1520. Albuquerque New Mexico. June 24-27, 2001

71. Reyes E., Garcia M., and Steidley C. "Using Genetic Algorithms in the Global Wiring of Integrated Circuits." Proceedings of the Annual Conference of the American Society for Engineering Education, CD-ROM Session 3520, Paper 5, June 2000.

Publications (Peer-Reviewed before 1999)

Page 17: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

1. Garcia M., Ellis, N., and Simmons D., "Intelligent Agents Applied to Software Management" International Symposium on Computer Science, November 11–13, 1998. pp. 63 – 69. Mexico D.F.

2. Muniz E., Escamilla J., Garcia M., “Arquitectura Distribuida de Agentes Para enlace de Intereses” XX Congreso Internacional de Ingenieria Electronica. ELECTRO 98October 26–30, 1998. pp. 6–11. Chihuahua, Chihuahua, Mexico

3. Garcia, M., Ellis, N., and Simmons D., "A Knowledge Base System used to Predict Schedule, Cost, Effort, and Defects in a Software Development Process" 9th International Symposium on AI November 12-15 1996, Cancun, Mexico. pp. 306–314.

4. Garcia, M., Ellis, N., and Simmons, D., "Intelligent Software Life Cycle Phase Predictor" 8th International Symposium of AI. Monterrey, N.L., Mexico. October 1995, pp. 342 - 347.

5. Garcia, M., Ellis N., and Simmons D., " Intelligent Software Status Predictor"Fuzzy 95. November 7-9 1995, San Francisco Cal., pp. 15-1 - 15-8

6. Garcia, M., and Cantu, F., "Trouble Shooting Expert System for the Combustion of Steam Generators" The World Congress of Expert Systems. Orlando Florida December 16-19, 1991.

7. Garcia, M. and Gonzalez, S., "Design of a Power Plant Control System" Proceedings of the IEEE Mexicon 81 Vol. III. Guadalajara, Jalisco, Mexico.

8. Trevino, G., Madariaga A., and Garcia, M., "SECAL" Sistema Experto en CalderasVI Reunion Nacional de Inteligencia Artificial. Mexican Society of Artificial IntelligenceQueretaro, Queretaro. Mexico. July 1989 pp. 463 – 470.

Publications with Students. (Student Conferences)1. Mallepally R. and Garcia M. IPhone Forensics Techniques. 5th Annual Graduate Scholarly

Works Symposium. Corpus Christi TX, April 22, 2011. 2. Iker Okan Aker and Mario A. Garcia. Visualization in Computer Forensics. 18th Annual

Student Conference for Research & Creative Arts.Houston TX, April 25 -26, 2012 3. Pradeep Pothnak and Mario A. Garcia. Apple Forensics on Third Party Applications. 18th

Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012

4. Farath Fatima and Mario a. Garcia. Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012

5. Akshara Upaluri and Mario A. Garcia Improvement in Digital Forensics with the basis of Reusability. 18th Annual Student Conference for Research & Creative Arts.Houston TX, April 25 -26, 2012

6. Maria A. Basani and Mario A. Garcia. Improving Kerberos Security Protocol using Various Logics. 18th Annual Student Conference for Research & Creative Arts. Houston TX. April 25 -26, 2012

7. Srikanth Padakanti and Mario A. Garcia. Session Based Tunnelling in VPN using IPSec protocol. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012

8. Aditya Cheruvu and Mario A. Garcia Identification and analysis of wormhole attacks in wireless networks. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012

Page 18: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

9. Chandupatla Druha Druthi and Mario A. Garcia Detection Techniques for Vulnerabilities in Web Services. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012

10. Rajavardhan Mallepally, Preethi Chittimalla, and Garcia Mario. iForensic Tool: The Ultimate iPhone Forensic Tool. 4th Annual Graduate Scholarly Works Symposium. Corpus Christi TX, April 23, 2010

11. Ruth Harding and Mario Garcia. A Forensics Analysis of Microsoft Windows Registry. 4th Annual Graduate Scholarly Works Symposium. Corpus Christi TX, April 23, 2010

12. Garcia Mario. “Computers Under Attack.” Instituto Tecnologico y de Estudios Superiores de Monterrey. Monterrey N.L. Mexico, April 18, 2008.

13. Arce E., Villegas G., and Garcia M. “Intrusion Detection Systems” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

14. Arce E., Villegas G., and Garcia M. How to select a PDA and a Wireless Card” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

15. Kothapally S, and Garcia M. Security Analysis in Steganography” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

16. Nalluri J, and Garcia M. “Attacks against Wireless Sensor Networks” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

17. Paladagu S, and Garcia M. “Forensics Analysis of Cellular Phones” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

18. Vangala R. K, and Garcia M. “ Security Faults in the Wireless Application Protocol” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

19. Dasari S, and Garcia M. “Bluetooth Vulnerabilities” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

20. Hayford A. O., and Garcia M. Wireless LAN Vulnerabilities” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008.

21. Duarte A. and Garcia M. “ The Breakdown of Malware” Graduate Scholarly Works Symposium. March 29, 2008.

22. Sinclair A, and Garcia M. “Statistical-Based Intrusion Detection” Graduate Scholarly Works Symposium. March 29, 2008.

23. Sunke B. and Garcia M. Wireless Security Vulnerabilities” Graduate Scholarly Works Symposium. March 29, 2008.

24. Nalluri J. and Garcia M. “Public Key Cryptography” Graduate Scholarly Works Symposium. March 29, 2008.

25. Dang, M.D, and Garcia M. “ Vulnerability Analysis in Operating Systems” Graduate Scholarly Works Symposium. March 29, 2008.

26. Kanisetti R. and Garcia M. “ The Study of Vein Patterns for Biometric Security” Graduate Scholarly Works Symposium. March 29, 2008.

27. Ponnala A., Shaik A., and Garcia M. Vulnerabilities in Virtual Machines” Graduate Scholarly Works Symposium. March 29, 2008.

28. William B, Mahady A, and Garcia M. “Free Space Optics(FSO) Topology, Architecture, Data Transmission, Routing, and Future Developments.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007

29. Garcia M. Community Outreach. SSI Hub Open Standard Workshop. Clear Lake University, Houston TX, March 3 – 5, 2007

30. Garcia M. Security Courses ISE/SSIP Hub Workshop. Dallas Texas August 3 – 5, 2007

Page 19: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

31. Yashwanth C, and Garcia M. “Game Systems Forensics.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007

32. Garimella A. S. and Garcia M. “Overview and Analysis of Forensics Tools.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007

33. Paladagu R. S. and Garcia M. “A study on Honeypoys.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007

34. Vuppala K. and Garcia M. “Symbian Operating System for Mobile Devices.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007

35. Dopierala R. and Garcia M. “Biometric Security.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi.

36. Ramana V. and Garcia M. “Buffer Overflow in C/C++ and Security Vulnerabilities.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi.

37. Gurrala P. and Garcia M. “Data Mining and Security” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi.

38. Smith S. and Garcia M. “Digital Forensics- New Developments in a Rapidly Evolving Field.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi.

39. Gilford R. and Garcia M. “Security of the Stream Control Transmission Protocol STCP.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi

40. Krishnappa H. and Garcia M. “Mobile E-commerce Security, Components and Design.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi

41. McConnell N, Mahdy A., and Garcia M. Mobile WiMax. Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi

42. Garcia M. Organic Qualitative Expert System “CSA Mechanical & Transportation Engineering Abstracts. 2007

43. Garcia M. “Password Cracking: A Dilemma Case Study in Computer Security.” University at Buffalo, Buffalo New York, May 25, 2006

44. Fonseca F. and Garcia M. “Computer Authentication using Biometrics” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006.

45. DeLoera S and Garcia M. “Biometrics Fingerprint Attainment”. Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006.

46. Cao Steve and Garcia Mario. “An Introduction to Honeypots” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006.

47. Krishnappa H.G. and Garcia M. “Biometrics Iris Recognition” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006.

Page 20: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

48. Chakinarapu R. and Garcia M. “Computer Forensics” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006.

49. Reddiplalli V. K. and Garcia M. “Role of Artificial Neural Networks in Intrusion Detection”

50. O’Brien T, and Garcia M. “Anti-Virus effectiveness.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005.

51. MacLeod A. and Garcia M. “Finding Vulnerabilities in Computers.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005.

52. Hytnen R. and Garcia M. “An Analysis of Wireless Security Fidelity.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005.

53. Landois L. and Garcia M. Use of Artificial Intelligence for Intrusion Detection. Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005.

54. Gilford R. and Garcia M. “What to Know When Protecting Computer Networks.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005.

55. Balasubramanian A. Pundir H. Kankanala V. and Garcia M. “Enforcing Information Assurance Using Biometrics” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004

56. Duraisamy K., Allawali F., and Garcia M. “An Expert System for Corn Disease Identification” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004

57. Allawali F. and Garcia M. “Computer Intrusion Detection Using Data Mining” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004

58. Durbha K. and Garcia M. “Threats and Facility Requirements in Physical Security” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004

59. Shroff N., and Garcia M. “Secure Socket Layer (SSL) Protocol; The Undisputed Heavyweight Champion for web Site Authentication and Encryption of Transactional data” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004

60. Hakl A. and Garcia M. “Implementation of two Algorithms to Compare Public and Private Key Cryptography.” Tenth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2004

61. Aijaz A. and Garcia M. “Signature-based Network Intrusion Detection System Using JESS (SNIDJ.” Tenth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2004

62. Strickland J., Fuqua S.and Garcia M. “Social Engineering in the University Setting Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.

Page 21: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

63. Hakl A. and Garcia M. “Public vs. Private Key Cryptography.” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.

64. Ross1, A. Trevino F. and Garcia M. “Computer Viruses, Worms, and Trojan Horses.” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.

65. Peña M. and Garcia M. “Hacking Tools: Friend or Foe?” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.

66. AuBuchon M. and Garcia M. Program Coding Vulnerabilities: The Buffer Overflow. Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.

67. Liza M. and Garcia M. “Iris Recognition: Society and it’s Anxiety” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003.

68. Krishna B, Vangala K, and Garcia M, CORN-EX: An Expert System for Corn Insect Damage Diagnosis . Ninth Annual Conference for Research & Creative Arts University of Houston-Clear Lake. April 23-24, 2003

69. Desiraju R, Jana K, and Garcia M, An Expert System For Inorganic Elements Ninth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2003

70. Shih-kai H. and Garcia M. An Expert System For PRECAST and PRESTRESS CONCRETE. Ninth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2003

71. Laurel C., Fuentes F, J. Johnson J., and Garcia M "Efficiencies of LEGO Mindstorms Programming Languages" 2003 National Conference on Undergraduate Research (NCUR 2003). UTAH. March 2003.

72. Laurel C, Fuentes F., and Garcia M. "Fundamental Computer Programming with LEGO Mindstorms." Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 2, 2002.

73. Daggula K.R., and Garcia M. Disease Diagnostic Identification and Recommendations for the Shrimp Industry." Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 2, 2002

Publications Before 19991. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Software Engineering Class Analysis”

Report Number: CSL-TR-28-95. Software Process Improvement Laboratory, Texas A&M University, January 26, 1995.

2. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Measurement Ranges”, Working Paper. Software Process Improvement Laboratory, Texas A&M University,November 30 1996.

3. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Software Engineering Class Analysis” Working Paper. Software Process Improvement Laboratory, Texas A&M University, December 20, 1996.

4. Garcia, M., "Software Management" Technical Report, 1995, Cognitive Systems Laboratory. Texas A&M University.

5. Garcia, M., "Estimating Software Size" Technical Report, 1995, Cognitive Systems Laboratory. Texas A&M University.

6. Garcia, M., "Improving Software Reliability Using Software Metrics" Technical Report, 1995, Cognitive Systems Laboratory. Texas A&M University.

Page 22: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

7. Garcia, M., "How to implement a Metrics Program" Technical Report, 1995, Cognitive Systems Laboratory, Texas A&M University.

8. Goodman, S., Garcia, M., and Ellis, N., "Intelligent Assistants/Associates Overview. Editorship (Book Chapters)

1. Garcia, M., and Cantu, F., SEMAT, An Expert System for Diagnosing problems in Tooth Paste Tube Machines. Operational Expert Systems in Mexico. F. Cantu. Pergamon Press, 1991, pp. 74 – 85.

2. Garcia, M., and Cantu, F., SECAL, An Expert System for Diagnosing Problems in Boiler Operation. Operational Expert Systems in Mexico. Cantu, F., Pergamon Press, 1991, pp. 7- 26

3. Instructor materials for the book: Computer Forensics: Incident Response Essentials. Warren G. Kruse and Jay Heiser. Addison Wesley.

Presentations (invited talks)1. Analysis and Investigation of SCAP tools (July 13) Naval Undersea Warfare Center,

Newport RI. July13, 2012. 2. Defense in Depth – Applications of Artificial Intelligence Techniques to Intrusion

Prevention. Naval Undersea Warfare Center, Newport RI. July17, 2012. 3. Challenges in Computer Forensics: A Research Perspective. Naval Undersea Warfare

Center, Newport RI. August 23 2011. 4. Analysis of Computer Forensics tools. Naval Undersea Warfare Center, Newport RI.

August 12 2011.5. Analysis of Educational Testing Service ETS tools and its incorporation into Blackboard

ETS Faculty Symposium. June 2011. Princeton NJ.6. Computers Under Attack. Instituto Tecnologico y de Estudios Superiores de Monterrey.

Monterrey Mex, April 14, 2008.7. Simposium Internacional de Sistemas Computacionales. Instituto Tecnologico de Saltillo,

Saltillo Coahuila Mexico. Octubre 20018. Simposium Internacional de Sistemas Computacionales. Instituto Tecnologico de Saltillo,

Saltillo Coahuila Mexico. Octubre 19989. II Jornadas Academicas. Conferencista magistral. Instituto Tecnologico de Lerdo. Cd.

Lerdo Durango, Mexico April 1998Paper Reviewer

1. 2008 Annual International Journal of Computer Mathematics2. 2008 Hawaii International Conference on Systems Science HICSS-403. IASTED Advances in Computer Science and Technology ACST 20064. Technical paper reviewer for the Consortium for Computing in Small College: Seventeen

Annual South Central Conference. 20065. ASEE 20066. SIGCSE 2006.7. Technical paper reviewer ITiCSE 20058. Communications of the ACM, 20059. Hawaii International Conference on System Sciences Author Services, 200510. Technical paper reviewer for the IASTED Applied Informatics 200411. Technical paper reviewer for Circuits, Signals, and Systems (CSS 2004)12. Technical paper reviewer for the IASTED Applied Informatics 200313. Technical paper reviewer for the Consortium for Computing in Small College: Fourteen

Annual South Central Conference. 2003

Page 23: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

14. Technical paper reviewer for the Consortium for Computing in Small College: Thirteen Annual South Central Conference. 2002

15. Technical paper reviewer for the IASTED Applied Informatics 200216. Technical paper reviewer for ITiCSE 200217. Technical paper reviewer for ASEE 200218. Technical paper reviewer for FIE 200219. Technical paper reviewer for the Consortium for Computing in Small College: Twelfth

Annual South Central Conference. 200120. Technical paper reviewer for the Consortium for Computing in Small College: Eleventh

Annual North East Conference. 2001Grant Reviewer

1. NSF-Scholarship for Service – SFS. May 5-7, 20142. NSF Graduate Research Fellowship Evaluation. Washington DC. January 20133. NSF NDSEG and SMART. Washington DC January 2013 4. DoD – ASEE Graduate Research Fellowship Evaluation. Washington DC. February 20125. NSF Graduate Research Fellowship Evaluation. Washington DC. February 20116. NSF Graduate Research Fellowship Evaluation. Washington DC. February 20107. NSF Graduate Research Fellowship Evaluation. Washington DC. February 20098. National Science Foundation Course, Curriculum, and Laboratory Improvement Program.

Washington DC July 20 2009.9. Ethics and values in Science, Engineering and technology Washington DC. May 200810. Graduate Research Fellowship Evaluation. Washington DC. February 200811. Minority Serving Institutions – Department of Homeland Security. Washington DC.

September 2007.12. Ethics and values in Science, Engineering and technology Washington DC. May 200713. Graduate Research Fellowship Evaluation. Washington DC. February 200714. NSF CCLI Phase II and III Washington DC, March 200615. NSF 2005 Graduate Research Fellowship Program. Washington DC, February 2005.16. Review Proposals submitted to the National Science Foundation Cyber Trust Program.

Washington DC, June 2004.17. Review Proposals submitted to the National Science Foundation Course, Curriculum, and

Laboratory Improvement Program. Washington DC July 20 2003.18. Review Proposals submitted to the National Science Foundation Adaptation and

Implementation Program. Washington DC. January 2003.19. Review Proposals submitted to the National Science Foundation Course, Curriculum, and

Laboratory Improvement Program. Washington DC July 20 2002.20. Review Proposals submitted to the National Science Foundation Course, Curriculum, and

Laboratory Improvement Program. Washington DC July 20 2001.21. Review of Panel Proposals submitted to the National Science Foundation Division of

Undergraduate Education. Washington DC July 2000.22. Review NSF ITR proposals. San Francisco Cal. May 2000.

Book Reviewer1. Review 12 Chapters for the book: Computational Intelligence.: Theory and

Implementation. Morgan Kaufman Publishers. October 2001 - February 20022. Review two chapters from a CS-2 with Java entitled "A Basic Collection Class and the

List Abstract data Type" Scott/Jones. January 2002.

Page 24: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

3. Review of a distance education site for the book "Starting out with C++. Tony Gaddis. Scott Jones. October 18, 2001

4. Review two chapters for a CS2 text using Java, entitled "Introduction: What We Will Study and Why" and "Fundamental Data Structures". Scott/Jones Publishing August 16, 2001

5. Review of a chapter for a CS2 text using Java entitled "The List Abstract Data Type."Scott/Jones Publishing March 12, 2001

6. Review three chapters on Patterns Based Software engineering. Scott/Jones Publishing February 26, 2001.

7. Review of an outline for a prospective CS2 text. Scott/Jones Publishing May 8, 2000Professional Service

1. IASTED International Program Committee Member on Wireless and Optical Communications (WOC) 2007)

2. IASTED International Program Committee Member (IPC) “Internet and Multimedia Systems and Applications (IMSA 2008)

3. Board of Directors of the Software Engineers Association 20074. Chair of the session: “Community Outreach” Shared Software Infrastructure SSI-Hub.

Clear Lake University. March 3 – 6, 2006.5. Member of the IEEE Computer Society Taylor Booth Education Award 2005, 20066. Chair of the Outreach committee of the SSI Hub. 20067. Board of directors of the Shared Software Infrastructure SSI – Hub project. Texas A&M –

IBM. 2006. 8. Co-chair: 1st Symposium on Information Assurance. Texas A&M University-Corpus

Christi. Corpus Christi TX, January 29 20059. Planning committee for the ASEE Gulf Southwest Conference 2005, Corpus Christi TX, 10. Paper session chair. Copyright, Watermarking, and Security. IASTED International

Conference on Internet and Multimedia Systems and Applications. February 21 – 23, 2005

11. Graduate Research Fellowship Evaluation. Washington DC. February 200512. Paper session chair. Frontiers in Education 2004. Savannah Georgia, October 20 – 2313. Member of the IASTED Technical Committee on "Artificial Intelligence and Expert

Systems" 2001-200414. Member of the TRUST Identity Theft group (Stanford, Berkeley, Cornell, Vanderville) 15. Member of the IEEE

University/College - Service1. International Education Council Committee 20102. Study Abroad Committee 2007 - 20103. Faculty Senate 2002 – 20064. Senate Faculty Affairs Committee 2002 – 20065. Senate Faculty Budget Committee 2004 – 20066. Senate Faculty Affairs Committee Chair2005 – 20067. Senate Executive Committee 2005 - 20068. University Sports Committee – 2000 – 20069. International Education Scholarship Committee member – 2006 – 200710. WEB Courseware Research Committee 200311. College Curriculum Committee 12. College Tenure Committee 2006 – 2010

Page 25: Mario Alberto Garcia Espinosafaculty.tamucc.edu/garciam/GarciaCVMarch2015.doc  · Web viewPradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. Arun

[Type text]

Department Service1. Computing Sciences Tenure Committee Chair – August 2007 – July 2008; 20102. Computing Sciences Graduate Studies Committee Chair - August 2007 – July 20083. Computing Sciences Chair Search Committee member 20074. ABET committee member – 2005 – 20075. Department Tenure Committee – 2006 – 20076. Department Mid-term Review Committee 2006 - 20077. Computing Sciences Security Policy Committee member – 2006 – 20078. Computing Sciences Network Security research group – 2006 – 20119. Computing Sciences Software Engineering Research group – 2006 – 200710. Computing Sciences BAAS program review 200711. Engineering Faculty Search Committee – 200612. Computer Science Network Administrator Search Committee 200513. Computer Science Graduate Program Review 2005

AwardsFaculty Fellowship Summer Institute in Israel 2010. FF2Israel June 9th to 17th.