March 2015 Mario A Garcia Professor Department of Computing Sciences Texas A&M University-Corpus Christi Center for Instruction # 331 mario.garcia@tamucc.edu 6300 Ocean Dr. phone: (361) 825 3478 Corpus Christi, Texas 78412 fax: (361) 825-2795 Current Position: Professor Academic Preparation Postdoc - University of Maryland University College UMUC Information Assurance. 2006-2007 Certificate - Carnegie Mellon University- Information Assurance. Summer 2003 Certificate - Purdue University - Information Assurance. Summer 2004 Ph.D. Texas A&M University. Computer Science - Dissertation Title: "Intelligent Agents Applied to Software Management" August 1997. M.S. Instituto Tecnologico y de Estudios Superiores de Monterrey (ITESM) - Computer Science.: Dissertation Title: "Methodology to Diagnose Alarms Using a Real Time Expert System" July 1991. M.S. Instituto Tecnologico de la Laguna. - Electrical Engineering: Thesis Title: "Set Theoretical Control" December 1980. B.S. Instituto Tecnologico de Saltillo - Electrical Engineering: Thesis Title: "Using Sparse Matrix for the Analysis of Electrical Circuits" June 1979 Professional Experience 2014 Visiting Scientist June – August. Lawrence Livermore National Laboratory 2013 Visiting Scientist June – August. Lawrence Livermore National Laboratory 2012 Visiting Scientist May – July Naval Undersea Warfare Center Newport RI 2011 Visiting Scientist July – August Naval Undersea Warfare Center Newport RI Visiting Scientist - June Educational Testing Service (ETS) Princeton NJ. 2010 Visiting Scientist June – July University of California at Berkeley 2008 Visiting Scientist Monterrey Tech. ITESM – Mexico June – August 208 2006 Visiting Scientist Stanford University June – August 2006 2005 Visiting Scientist CERT/SEI/CMU Carnegie Mellon University June – August 2009 Adjunct Full-Professor – University of Maryland University College (online) 2009 Professor Texas A&M University Corpus Christi – Computer Science 2004-2009: Associate Professor Texas A&M University Corpus Christi – Computer Science 1999-2004: Assistant Professor Texas A&M University Corpus Christi – Computer Science 1998-1999: Assistant Professor Instituto Tecnologico y de Estudios Superiores de Monterrey 1996-1997: Lecturer Texas A&M University Department of Computer Science 1994-1996: Research Assistant Texas A&M University Department of Computer Science 1993-1994: Research Assistant Texas A&M University Forest Science Department 1988-1991: Research Assistant Instituto Tecnologico y de Estudios Superiores de Monterrey 1979-1988: Professor National System of Technological Institutes. 1982-1983 Professor, Electrical Engineering, National University of Mexico (UNAM). [Type text] Administration 1987-1988 Professor and Sub-Director, Tecnologico de Saltillo, Saltillo Mexico. 1986- 1987 Professor and Sub-Director, Tecnologico de San Luis, San Luis Potosi Mexico 1983-1986 Professor and Sub-Director, Tecnologico de Piedras Negras, Piedras Negras Coahuila Mexico 1982-1983 National Coordinator of Electrical Engineering. National System of Technological Institutes, Mexico City. Teaching University of Maryland University College: INFA650 -9041 Graduate: Introduction to Computer Forensics August 2006 - Present Texas A&M University Corpus Christi Graduate: COSC 5311 Fundamentals in Programming and Problem Solving I; COSC 5312 Fundamentals in Programming and Problem Solving II; COSC 5320 Design and Implementation of Computer Instructional Systems; COSC 5321 Data Structures; COSC 5325 Foundations of Software Engineering; Advanced Software Engineering; COSC 5348 Expert Systems; COSC 5354 Artificial Intelligence; COSC 5374 Computer Forensics (course developed); COSC 5375 Information Security (course developed); COSC 5376 Network Security (course developed); COSC 5377 Wireless Security (course developed); COSC 5378 Survivable Systems (course developed); COSC 5379 Advanced Information Assurance (course developed). COSC 5590 Selected Topics: Wireless Security(course developed . Advanced Artificial Intelligence (course developed) Ethical Hacking (course developed); Undergraduate: COSC 1436 Introduction to Problem Solving with Computers II; COSC 2437 Data Structures; COSC 2470 COBOL; COSC 3353 Survey of Programming Languages COSC 3370 Software Engineering; COSC 3380 Undergraduate Research Experience; COSC 4310 Digital Forensics (course developed); COSC 4430 Artificial Intelligence; COSC 4354 Systems Analysis and Design (Capstone course). Computer Architecture. Tecnologico de Monterrey (ITESM) Reasoning and Search Systems, Artificial Intelligence, Practical Training. Texas A&M University Artificial Intelligence, Software Engineering, Fortran 90. Tecnologico de Saltillo Electrical Power Systems, Control Theory 1, Control Theory II, Logical Circuits Expert Systems, Artificial Intelligence, Software Engineering, Software Quality Data Structures, Pascal, Discrete Mathematics, Analysis of Algorithms Graduate Projects Committee Chair (Completed) 1. Shivani Reddy Atigada. A Collaborative Filtering Recommendation Algorithm based on User Clustering and Item Clustering. November 12, 2014. 2. Ranjith Kumar Bodla. Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Stradding. November 12, 2014 3. Srilaxmi Gandra. Cyber Card Detection and Prevention System for Ecommerce. November 2014. 4. Ricardo A. Garcia. Computer Forensics: Password Recovery Tool using Odroid-XU Implementation. November 24, 2014 [Type text] 5. Mohammed Shahid Sultan. Detecting HTTP based Botnet Command and Control Channels in Network Traffic using BotSniffer. December 1, 2014. 6. Yellu Sirisha. 7. Goddam Bharath Simha Reddy . Securly Sharing Multimedia Files Over Internet Using Cryptography and Partial Steganography. December 1, 2014. 8. Haritha Devulapally. Implementation of an Android Application to help users Recover and Secure a Lost Phone. July 2014 9. Anurag Reddy Muppidi. An Android Application to Integrate and Secure Social Networks and Emails. July 2014. 10. Pratyusha Adasumalli. Implementation of an Android Application to Retrieve Information from a Lost Android Device. Spring 2014. 11. Naga Sandeep Thatipally. Implementation of an Application Using Third Party Auditor for Secure Cloud Storage. Spring 2014 12. Pavithra Roscillini Bandela. Implementation of an Android application to enhance security in Social Networks. Spring 2014 13. Sumanth Minnakanti. Hiding information in Audio, video, and Images Using Steganography. Spring 2014 14. Swetha Davana. Implementation of an Application to Secure Personal data Using Enhanced Data Encryption Standard. Spring 2014. 15. Sachin Samrat Medavarapu. Improving The Efficiency of Packet Marking Using Modulo Operation. July 2013. Thesis 16. Tingh Trun Applying Back-Propagation Artificial Neural Networks to detect Attacks in Computer Networks. April 9, 2013 – Thesis 17. Aditya Cheruvu “Email Spam Detector: A Tool to Monitor and Detect Spam Attacks” December 2012. 18. Santosh Kumar Reddy Yerramorusu “Secure Calls and SMS Logs” December 2012 19. Anuudeep R. Kandi “Design and Implementation of a tool to help Computer Forensics Instructors to Demonstrate Common Data Hidden Techniques” December 2012 20. Ashwini M. Achar. Design and Implementation of Software Tool to Detect and Prevent Access to Malicious Users attacked by Cross-Site Scripting Attack. August 6, 2012 21. Vamshi Krishna Eranti Implementation of Hop-based Packet Marking for IP Traceback. August 2, 2012. 22. Nithisha Repaka. Tool for Implementation of Strategies to detect Botnet Attacks August 2012. 23. Deepthi Jambula. Implementation of a Prototype to Detect Network Attacks by Analyzing Irregular User Behavior. August 2012. 24. Stephen Smith. Tightening the Net: Examining and Demonstrating Commonly Available Network Security tools. April 2012. 25. Ramchander Mudu. Design and Implementation of a Visualization System to Prevent Cheating in Online Tests. April 24, 2012. 26. Ankush Vee. Evaluation of Cloud Security Using Firewalls. April 24, 2012. 27. Kartik Konnarraju. Data Security in Cloud Computing Using Encryption. April 25, 2012. 28. Rahul Guija. An Attacker Agent Identification Tool in Data Distributed Systems. April 25, 2012. 29. Santosh Kumar Birkur. Link Failure Detector and Simulation of Metrics in Distributed Network. April 26, 2012. [Type text] 30. Maria Anurag Basani. APuzzle-based Authentication Method with Serer Monitoring. April 26, 2012. 31. Pradeep Kumar Pothnak. Secure and Invulnerable Coding in C and C++. April 27, 2012. 32. Arun Kumar Ankam. Implementation of a Tool o Conduct Live Forensics Acquisition in Windows Systems. April 2012. 33. Kamalendar Kotha. Visual Cryptography Tool For Embedded Halftone Shares. May 2012. 34. Sudheer Chennuri. Integrated Forensics Tool for Web Browser Analysis. May 2012. 35. Srikanth Padakanti. Rootkits Detection Using Inline Hooking. May 2012. 36. Kalyani Suram. Analysis, design and implementation of a password cracking tool May 2012. 37. Divya Tara Puvvula. Implementation of a tool for Detecting and filtering Spam. May 2012. 38. Sai Saran Tockachichu. Virtual Environment based training material for Computer Forensic Investigations May 2012. 39. Linh Manh Pham Real-Time Web-based Hyperspectral Data Viewing and Modeling. December 1st, 2011. 40. Farath Fatima Detection of DataBase Attacks Using Computer Forensics Tools. December 6, 2011. 41. Anusha Gollapudi. Web Log Analyzer. December 9, 2011 42. Sravani Pedamallu. Implementation of an Enhanced Hidden Markov Model in Detecting Crediting Card Frauds. December 9, 2011. 43. Anusha Pesaru. Analysis, Testing, and Comparison of Open Source Encryption Tools. December 13, 2011 44. Soumya Mitakanti – Forensics Analysis of the Lustre file System July 22, 2011 45. Rakesh Sambhuni – Checking the Security of a Website using a Phishing Website Detector July 22, 2011 46. Drhuja Druthi – Forensics Analysis and Trusted monitoring System Prototype Implementation in Cloud Computing . June 1, 2011 47. Pretthi Chitimalla – Steganography via Sound Effects in Power point Files June 1, 2011 48. Raja Mallepally Implementation of Applications to Improve iPhone Forensics Analysis and Integrity of Evidence. June 2, 2011 49. Ragu Deshu – Implementation of a Tool to Defend Wireless Networks against unauthorized Access. May 2011 50. Shravya Lanka – Enhancing Forensic Investigations in Large Capacity Storage Devices using WEKA: A Data Mining Tool. May 2011 51. Chaitanya Chinthireddy – Implementation of an Intrusion Detection System based on SNORT rules and using the Expert System tool Jess. May 2011 52. Midhula Thota. Social Networks Forensics. May 2011 53. Satish Mallepaly – Design and Implementation of WIN-RM (Windows registry Monitor) forensic Tool. May 2011 54. Srikanth Kotha – ENCACHARE: An Anti-forensics tool to Encrypt, Camouflage, Change, File properties, and Rename files. May 2011 55. Ruth Hardening . A Forensics Investigation of Windows Registries December 1, 2010 56. Jose Javier Escobar A Forensics Analysis of Network Security Logs on a Virtual Environment. December 3, 2010 [Type text] 57. Barath Kumar Paravastu Design and Implementation of a Wireless Packet Sniffer. November 22, 2010. 58. Sandeep Aluvaka. Implementation of a Steganalysis tool to detect Steganography in a wireless forensics investigation. November 19, 2010 59. Srilakshmi Erasani. Analysis of Criminal Anti-Forensics Methodology and Anti-Anti Forensics Defense. November 5, 2010 60. Sandeep Kumar Khanikekar Web Browsers Forensic Investigation. November 2, 2010 61. Vamshi K. Kancheti. Security Analysis of Social Networks. September 20, 2010. 62. Bandela Rini. Intrusion Detection System With Intelligent Agents Techniques. August 2010 63. Satya Harini Reddy. Analysis, Implementation, and Testing of Anti-Forensics Techniques May 4, 2010 64. Urmila Konsam. “Designing Security Architecture and Securing Web Applications using Secure Sockets Layer (SSL).” December 5, 2008. 65. Bhavani Sunke. “Analysis and Hardware Support for Intrusion Detection System Tools.” December 4, 2008 66. Gonzalo Villegas. “Analysis of Tools for Conducting Wireless Penetration Testing.” December 4, 2008. 67. Eduardo Arce. “Analysis of Mobile Phone Forensic Software Tools.” December 3, 2008. 68. Prashanth Gurrala. “Widgets for Mobile Device.” November 19, 2008. 69. Venkata Devarapally. “Survivable Systems and Secure Programming.” November 12, 2008. 70. Suman Paladugu. “Analysis of Mobile Phone Forensic Software Tools” October 16, 2008. 71. Rocky Martin. “Bluetooth and JAVA helping Sight Impaired.” May 2, 2008. 72. Narayanan Srinivasan. “Web Content Management System for an Online News Service.” May 9, 2008. 73. Kevin Krause. “Introducing Shades of Gray into an Otherwise Black and White World: The Consideration of Ethics in the Field of Information Assurance.” April 25, 2008. 74. Sai Ajay Kummar. “Research, Analysis and Efficiency Measurement of Forensics Tools and Techniques to Detect Criminal Evidence to be used in a Court of Law.” Fall 2007. 75. Kiran Vupala. “Design of Internet Applications for Symbian OS Based Mobiles.” Fall 2007. 76. Ramakrishna Reddy Vodeti. “Study of Intrusion Detection Tools to Avoid Phising.” Fall 2007. 77. Anthony Weitekamp. “Derivation of Symmetric Encryption Keys From Synchronized Chaotic Systems.” Spring 2007. 78. Veera Kishore Reddipalli. “Design and Analysis of Intrusion Detection Using Honeypots.” Fall 2006. 79. Ramya Chakinarapu “Programming a Controller for Video Conversion and Text Data Overlay.” Fall 2006. 80. Jayanthi R. Kalvemula. “Research, Analysis and Efficiency Measurement for E-mail and SPAM Detection/Prevention.” Fall 2006. 81. Lakshami Pinneti. “Detection and Identification of Bacterial and Parasitic Pathogens in Fish Husbandry using Web-based Expert Systems.” Spring 2006. 82. Vamshi Kankanala “Web-based Network Intrusion Detection Expert System.” Spring 2006. [Type text] 83. Satrunga Pakala “Using Biometrics to Generate Public and Private Keys .“ Spring 2006. 84. Firoz Allahwali. “Implementation of an Offline Intrusion Detection System Using Data Mining.” Spring 2006. 85. Ankita Nellimarla. “Biometric Authentication Tool for User Identification Based on Keystroke Dynamics.” Summer 2006. 86. Ramesh Krishnamoorthy. “Active Change Auditing and Integrity Verification System using MD5 Hashing.” Summer 2006. 87. Randy Cisneros. “Dictionary Attack Method for UNIX Systems Using Salt.” Fall 2005 88. Jasbir S. Parmar. “Network Intrusion Detection Using EagleX and Securepoint Nuzzler.” Fall 2005. 89. Carl J. Perales. “Development of a Hybrid Knowledge-Based Training System for Heating, Ventilating, and Air- Conditioning (HVAC) Load Calculations.” Fall 2005. 90. Karthik Duraisamy “Design and Implementation of a Visualization Statistical and Analysis Tool for Comparison of Atmospheric Model Predictions of the Golf of Mexico.” Fall 2005. 91. Shiraz Ahmed “Electronic Learning in Nursing Education.” Fall 2004. 92. Aijaz Ahmed “Signature-based Network Intrusion Detection System using JESS.” Spring 2004. 93. Norma N. Nolazco. "Data Mining in Real World Database Application" Summer 2003. 94. Brian McCord. “Using Neural Networks and Genetic Algorithms to Predict Stocks.” Summer 2003. 95. Allen J. Brotze “An Expert System for Training Medical Students.” Fall 2006. 96. Eunjoon Hwang. "Image Fusion." Fall 2003. 97. Jeremy D. Zapata. “A Learning Aggregator - A Bayesian Classification System for Online Syndication.” Fall 2003 98. Leonardo F. Duarte "Web-Based Expert System for Diagnosis and Treatment of Diabetes." Fall 2002. 99. Carlos Mendieta- "A Comparison of Artificial Neural Network Models for Predicting Tide Levels." Fall 2001. 100. Tinu Singh. "Prototype Expert System for Diagnosis and Treatment of Diabetes." Spring 2001. 101. Sreevani Pelala. “Robot Path Generator”. Fall 2000. Graduate Projects Committee Member (Completed) 1. Himavarsha Surabi. Hybrid Model for Intrusion Detection using Data Mining Spring 2014. 2. Rakesh Kumar Srirangam. A Novel Steganographic Tool for Multilevel Protection 3. Anusha Pesaru – Extracting Social Behavior from Social Networks. December 13, 2011 4. Sharath Ranga Probabilistic Top-k Query Processing Using Central Limit Theory. July 23, 2011 5. Diana M. Rojas: Integrating Threat Modeling in the Secure Agent-Oriented Software Development. December 2010 6. Archana Gudala: A Holistic Schema Matcher Application. December 2, 2010 7. Bo Dong. A Novel SemiDefinite-Based Localization System: Design and Evaluation. Summer 2009 8. Rajesh Kanisetti. “Voice Interactive Internet Browser.” Spring 2009 9. Sreekrishna Nallela. Probabilistic Discovery of Motif’s in Primary Water Levels” 2009 [Type text] 10. Yashwanth Chintala. “Extracting the Semantic Structure of Web pages Using the Visual Based Segmentation algorithm” December 3, 2008 11. Francisco Fonseca. “ Wireless Security” December 2, 2008 12. Srujan Kothapally – Data Integration for the Gulf of Mexico Satellite Observations. November 24, 2008 13. Joseph Nalluri. Peer to Peer Database Integration using Piazza. September 25, 2008. 14. Sumit Agarwal. “Machine Translation.” Fall 2007. 15. Sheshidhar Odeti. “Wave Steganography.” Fall 2007. 16. Hemanth Gowda Krishnappa. “Fingerprint Verification using Mutual Information.” Fall 2007. 17. William J. Shelton Design of a Face Recognition Subsystem for Use in a Digital Photo Album. Spring 2007. 18. Randy DeLeon. “Securing Sensitive Information in Cookies.” Spring 2007. 19. Felix Fuentes. “Biometrics and Vein Map Authentication.” Spring 2007. 20. Himanshu Pundir “Immediate Assessment of a Class Lecture Using a Handheld Device.” Spring 2006. 21. Naresh Kumar Peapully Shroff. “Task Management System on Pocket PC.” Fall 2005. 22. Ashwani Tomar “Mapping and Monitoring of LiveOak Peninsula Area.” Fall 2005. 23. Kiran Jana. “Design and Implementation of Online Grading & Tracking System.” Fall 2005. 24. Gnan Mekala “Task Management System.” Fall 2005. 25. Bindu Yaparla. "Resource Management System for Disability Students." Spring 2005. 26. Bhargavi Hiremagalur. “WLAN Traffic Grapher Using Simple Network Management Protocol (SNMP).” Fall 2004. 27. Krishna Reddy Dagula. "WinFind, A Tool to Measure the Bandwidth of Asymetric Links on Internet." Fall 2003. 28. Raghavendra P. Desiraju. "The Design and Implementation of a Cashier System." Fall 2003. 29. Sae Hwang. "The Design and Implementation of a Virtual Engineering Technology Laboratory." Fall 2002. 30. Abhijeet Trivedi. "Read, Review & Assess System." Spring 2002. 31. Kevin Nelson. "An Automated System for Administering and Scoring the Case Strategies for Case Supervision Assessment Instrument." Fall 2001. 32. Rui Shen. "Design and Implementation of WinTrace: An Internet Path Characterization Tool." Fall 2001. 33. Matthew Johnson. "Development of an Intelligent Autonomous Robotic System Using a Hybrid Control Architecture and Enhanced Topological Mapping." Fall 2001. 34. Tao Huang. "Personal Investments-Assistance System." Summer 2001. 35. Ying Shen. "Online Indexed Reflection/Collection Student Notebook Structure." Spring 2001. 36. Sean Babcock - "Clips to C Interface for Mobile Robot Control." Fall 2000. 37. Shekar C. Gudi. "Design of an Automated Natural Language Processing Algorithm for an Industrial Environment." Summer 2000. 38. Kelly Mierzwa Todorov. "Medical Manager Word-Processing Interface." Spring 2000 Continuing Education [Type text] 1. Parallel Computing TotalView Debugger. 7/19/2013. Lincoln Livermore National Laboratory 2. Parallel Computing POSIX Threads Programming. 7/18/2013. Lincoln Livermore National Laboratory 3. Parallel Computing Open MP. 7/18/2013. Lincoln Livermore National Laboratory 4. Parallel Computing Message Passing Interface. 7/17/2013. Lincoln Livermore National Laboratory 5. Parallel Computing Moab. 7/17/2013. Lincoln Livermore National Laboratory 6. Introduction to Parallel Computing. 7/15-16/2013. Lincoln Livermore National Laboratory 7. Black Hat Conference – Las Vegas Nevada – July 30 – August 4 2011 8. DEFCON Hackers Conference – Las Vegas Nevada August 6 – 8, 2011 9. Black Hat Conference – Las Vegas Nevada – July 28 – 29 2010 10. DEFCON Hackers Conference – Las Vegas Nevada July 30 – August 1 2010 11. University of Berkeley: Summer 2010 12. Fourth Annual Department of Homeland Security (DHS) University Network Summit held March 10-12, 2010. Washington DC. 13. CERIAS Information Assurance Symposium. Purdue University. March 30 – April 1,2010. West Lafayette, Indiana 14. Information Assurance and Security Ethics Workshop. March 28 – 20, 2010 Purdue University. 15. Minority Serving Institutions Technical Assistance – Capacity Building Conference. September 21-24, 2009. Dallas Texas. 16. Rochester Institute of Technology – June 22-25, 2009 Information Assurance Boot Camp 17. Rochester Institute of Technology – Summer 2007 – Information Assurance Boot Camp 18. Access Data Boot Camp (Windows Registry) Corpus Christi TX, December 19 – 21, 2007. (Online) 19. Learning to Teach Online using the tool WebTycho. University of Maryland University College. August 19 – September 23, 2007. 20. Information Assurance Workshop. Rochester Institute of Technology. August 6–17, 2007. 21. The Women's Institute in Summer Enrichment (WISE). Workshop on Sensor Networks. Berkeley University. Berkeley Cal. June 10 - 16 2007. 22. Summer Workshop On Teaching about Terrorism (SWOTT). Morehouse College in Atlanta, Georgia, June 17-23, 2007. 23. Affinity Research Group Workshop. Corpus Christi TX, May, 2007. 24. Access Data Boot Camp (Forensics Tool Kit FTK) Portland Or. May 8–10, 2007. 25. TRUST Team for Research in Ubiquitous Computing. Workshop Spring Retreat. Oakland Ca. March 19 – 20, 2007. 26. Joint NASA/NSF Conference for Higher Education Principal Investigators, Faculty, and Partners, Chantilly, VA.February 22-24, 2007. 27. TRUST Team for Research in Ubiquitous Computing. Workshop Fall Retreat. Pittsburgh Pa, October 5 – 6. 2006. 28. The Women's Institute in Summer Enrichment (WISE). Workshop on Ubiquitous Secure Technology . Berkeley University. Berkeley Cal. July 5 – 11 2006. 29. 2nd Trustworthy Interfaces for Passwords and Personal Information workshop. Stanford University. Palo Alto Cal. June 19, 2006. [Type text] 30. EnCase Incident Response, Forensic Analysis and Discovery. Guidance Software – Pasadena CA. November 15 – 18, 2005. 31. Software Engineering “SSI-Hub” Workshop. Texas A&M University. College Station, TX. August 24-26 2005. 32. Symposium On Usable Privacy and Security (SOUPS 2005). Carnegie Mellon University. July 12-14, 2005. 33. CISCO Security Professor Professional Development. CISCO Security Boot Camp. Carnegie Mellon University, July 14-19, 2005. 34. Workshop on Case Studies Teaching in Science. Buffalo New York, May 14 – 21, 2005. 35. The Learning Paradigm College. Texas A&M University-Corpus Christi. April 8 – 9 2005. 36. Information Security for Network Managers. Carnegie Mellon University – Software Engineering Institute. July 13 – 14, 2005. 37. Ethics in Computer Science. San Diego California. February 23 – 27 2005. 38. FASEB Grantsmanship Training Program Atlantic Beach, Florida April 28 – May 1, 2004. 39. Assessing NASA’s Educational and Research Funding Opportunities. San Antonio TX, April 26 2004. 40. Information Assurance Education Graduate Certificate Program at Purdue University. West Lafayette, Indiana. June 14 – August 6 2004. 41. Advanced Information Security for Technical Staff. Carnegie Mellon University – Software Engineering Institute. May 10 –14 2004. 42. Information Security for Technical Staff. Carnegie Mellon – Software Engineering Institute. March 29 – April2, 2004. 43. CISCO Security Professor Professional Development. CISCO Security Boot Camp. TAMU-Commerce, Dallas TX, August, 21- 23 2003. 44. Information Assurance Capacity Building Program. Carnegie Mellon University. Pittsburgh PA, July 6 - August 1 2003. 45. Dare to Soar. Cultural Competencies Workshop Managing Diverse Cultures at the Speed of Change. Corpus Christi, Texas, October 11, 12 2002. 46. Introductory Workshop on Computational Science in Undergraduate Education. Texas A&M University Corpus Christi.July 28 – August 3 2002. 47. Office of the Governor Budget and Planning State Grants Team. Writing to Win Corpus Christi Texas, May 15-17 2002. 48. Writing Winning Proposals. San Antonio Texas, 2001. 49. Dr. Scheme Workshop. Texas A&M University-Corpus Christi, November 29, 1999. 50. Java Workshop. Texas A&M University-Corpus Christi. November 12, 1999. Scholarship Research Proposals Submitted Funded 1. Mario A. Garcia. Design Implementation and Testing of a Virtual Forensics Laboratory. NSF-TUES 2012. 2. Mario A. Garcia Analysis of Mobile Devices Forensics Tools” Texas Research Development Fund. 09/01/2009 – 08/30/2010 $24,000 3. Mario A. Garcia. “Use of Cell Phones to give Location Information to Blind People.” Texas Research Development Fund. 09/01/2008 – 08/30/2009. $25,000.00 4. Co-PI, “Computing Infrastructure for Research-Based Learning (CIRBL)”, National Science Foundation (NSF). PI: John Fernandez, Co-PIs: Mario Garcia, Dulal Kar, Scott [Type text] King. (9/2007-8/2010) (NSF agreed to award $650,000.00) – Garcia: Money used for a graduate research student. 5. Ahmed Mahdy and Mario A. Garcia – Texas Research Development Fund –$34,900.00 September 2007 – August 2008. On-The Move Secure Broadband Wireless Networks for Future Digital Battlefields. Garcia: Money used for a graduate research student and one month of salary. 6. Mario A Garcia – Department of Homeland Security/University of Maryland University College – Information Assurance Fellowship $30,000.00 (Postdoc on Information Assurance) July 2006 – December 2007. 7. Mario A. Garcia – NSF/Quality Education for Minorities (QEM) Fellowship. Faculty Summer Appointment Award $11,000.00 June – August 2006. 8. Melissa Dark, Nathan Harter, Linda Morales, and Mario Garcia. Collaboration: Ethics Education in Computing – A moral Development/ Constructivist Approach. January 2006 – December 2009. $230,000.00. NSF Ethics in Science and Engineering (EESE) . Garcia $45,000.00. Chapters on How to teach Information Assurance Ethics. 9. Stephen Dannelly, Dulal Kar, Mario Garcia, John Fernandez., NSF CISE MII 2003: Extending and Strengthening the Pipeline in Computer Science. September 2003 – August 2008. $1,499,997.00. Garcia: Implementation of the Digital Forensics Lab, Implementation of the Network Security Lab. 10. John Fernandez, Mario Garcia, and Dulal Kar. CISCO. $62,901.00. Hardware donated to Texas A&M University-Corpus Christi. September 1, 2003 Mini-Grants 11. Mario A. Garcia Educational Testing Service Faculty Fellowship – Princeton NJ June 2011 12. Mario A. Garcia ASEE – ONR Faculty Fellowship Navy Undersea Warfare Center Newport RI, July August 2011 13. Mario A. Garcia Faculty Fellowship Summer Institute Program in Israel. June 9 – 17, 2010. 14. Mario A. Garcia – Texas Research Development Fund – “Using Artificial Neural Networks and Statistics for the Creation of a Computer Network Intrusion Prevention Model” $8,000.00 September 2006 – August 2007. 15. Ahmed Mahdy and Mario A. Garcia – Texas Research Development Fund – “Securing, Extending and Levering City WiFi Networks: The Pioneer Corpus Christi Case” $33,1500.00 September 2006 – August 2007. 16. Mario A. Garcia – College Research Grant - $3,000.00 September 2006 – August 2007. 17. Mario A. Garcia. WISE Fellowship for the WISE 2007: Women Institute in Summer Enrichment program at the University of California, Berkeley. June 10- 16, 2007 18. Mario A. Garcia. Department of Homeland Security Fellowship to attend the Summer Workshop On Teaching about Terrorism (SWOTT). Morehouse College in Atlanta, Georgia, June 17-23, 2007. 19. Mario A. Garcia. Enhancing Security in the Corpus Christi Wireless Network. $3,000.00 College Research Enhancement Program. April 20, 2007 20. Mario A. Garcia. Mini-grant award for participation in the Joint NASA/NSF Conference for Higher Education Principal Investigators, Faculty, and Partners, Chantilly, VA.February 22-24, 2007. 21. Mario A Garcia. Security Workshop. Bethlehem PA, August 4-5th, 2005. $1,000.00 22. Mario A Garcia. TAMU-CC Science and Technology Scholarships Fall 2004 $ 5,000.00 [Type text] 23. Mario A Garcia. TAMU-CC University Research Grant. November 2004. $ 6, 411.00 24. Mario A Garcia . TAMU-CC College Research Grant. September 2004. $3,000.00 25. Mario A. Garcia. NSF SFS Information Assurance Workshop – Rochester Institute of Technology August 6 – 17, 2007. $3,000.00 26. Mario A Garcia . TAMU-CC College Research Grant. September 2003. $2,000.00 27. Mario A. Garcia. Information Assurance Grant. - Carnegie Mellon University. Pittsburgh PA. July - August 2003. $7,666.00 28. Mario A. Garcia. Federate Computing Research Grant - San Diego Cal. June 2003. $1,000.0 Journal Publications 1. Pham M. L., Garcia M., and Mehrubeoglu R. “Real Time Control We-based Hyperspectral Imaging System” IEEE Transaction on Computers. Submitted January 31, 2012 2. Garcia M., and Paravastu B. Packetxtract: A Wireless Traffic Sniffer. Submitted to the International Journal of Network Security. January 15, 2012 3. Bachnak R., Chakinarapu R., Garcia M., and Kar. D. “A System for Video Conversion and Text Data Overlay.” WSEAS Transactions on Circuits and Systems. ISSN 1109-2734 Issue 1, Volume 7, January 2008. Pp. 39-48. 4. Dark M., Morales L., Harter N., and Garcia M. “An Information Assurance Ethics Education Model.” The Journal of Computing Sciences in Colleges. 2008 pp. 82-88. 5. Phillip Ian Wilson P. I and Garcia M. “A Modified Version of the Vigenere Algorithm” IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2, February 2006. 6. Hytnen R. and Garcia M., “An Analysis of Wireless Security.” The Journal of Computing Sciences in Colleges. 2006 pp. 210 – 216. 7. Fernandez J., Evans A., Camacho D., and Garcia M. “Software Engineering Industry Experience – The Key to Success” The Journal of Computing Sciences in Colleges. 2006 pp. 230 – 236. 8. Garcia M. Cisneros R, and Bliss D. “Password Auditing Applications” The Journal of Computing Sciences in Colleges. 2006 pp. 196 – 201. 9. Fernandez J, Smith S, Kar D, and Garcia M. “Computer Forensics – A critical need in Computer Science Programs ” The Journal of Computing Sciences in Colleges. Vol., Number 4 pp. 315 – 322 April 2005. 10. Dannelly S, Steidley C, Pelala S. and Garcia M. “Robots and Search Algorithms: RealWorld Applications for Students.” Computer in Education Journal. Vol. XIV NO. 2 April – June 2004. 11. Johnson M and Garcia M. “Implementation of Three Robotic Control Architectures for Robot Navigation." The Journal of Computing Sciences in Colleges. Vol. 18, Number 4. pp. 38 – 47 April 2003. 12. Starek M, Garcia M. and Tomer M. “An Expert System for Mineral Identification.” The Journal of Computing Sciences in Colleges. Volume 17, Number 5. pp.193-197. April 2002. 13. Garcia M, A. Gandhi, T. Singh,L. Duarte, R. Shen, M. Danthu, S. Ponder, and H. Ramirez. “ESDIABETES An Expert System in Diabetes.” The Journal of Computing Science in Small Colleges. Amarillo, Texas. April 6-7, 2001. Vol. 16, Number 4. pp 166 – 175. [Type text] 14. Garcia M. “Education in the Century XXI.” The Journal of Computing Science in Small Colleges. Volume 15, Number 3 pp.16-24. April 2000. 15. Cantu-Ortiz, F., and Garcia-Espinosa M. (1992). “An Expert System for Diagnosing Problems in Boiler Operation.” Expert Systems with Applications: An international Journal, Pergamon Press, 5(3-4), pp 323-336, 1992 Publications (Peer-Reviewed) 1. Garcia M. Applications of Artificial Intelligence to Intrusion Detection. San Jose state University. April 18, 2014. 2. Garcia M and Mallepally R. “Applications to Improve IPhone Forensics” Accepted for publication at the 28th International Conference on Computer and Their Applications CATA 2013. Honolulu Hawaii. March 4 – 6 2013 3. Garcia M and Mudu R. “Design and Implementation of a Visualization System to Prevent Cheating in Online Testing” Accepted for publication at the E-Leader International Conference. Singapore, January 2-4 2013. 4. Garcia M and R Sambhuti. “Phishing Web Sit Detector for Improving Network Security” Accepted for publication and presentation at the E-Leader Berlin Conference June 2-4 2012 5. Garcia M and Pedamallu S. “Implementation of an Enhanced Hidden Markov Model in Detecting Credit Card Frauds” Accepted for publication and presentation at the E-Leader Berlin Conference June 2-4 2012 6. Garcia M and Rini B. Network Intrusion Detection Using Intelligent Agents. The 2011 International Conference on Security and Management (SAM'11: July 18-21, 2011, Las Vegas USA). 23 % acceptance rate. 7. Garcia M, and Mallepally R. Implementations of Applications to Improve iPhone Forensics Analysis & Integrity of Evidence. Techno Forensics Conference. Myrtle Beach, SC. October 31 – November 1, 2011 8. Vodeti R, and Garcia M. Spoof Guard: An Internet Tool Used to Prevent Identity Theft. E-Leader International Confeence. Budapest Hungary June 7-10, 2010 9. Krause K, and Garcia M. “Study of Ethics in Information Assurance” E-Leader International Conference. Tallin Estonia. June 8-10, 2009. http://www.g-casa.com <http://www.g-casa.com/> , ISSN 1935-4819. 10. Krause K, and Garcia M. “The Information Assurance Ethics Dilemma” E-Leader International Conference. Tallin Estonia. June 8-10, 2009. http://www.g-casa.com <http://www.g-casa.com/> , ISSN 1935-4819. 11. Villegas G, and Garcia M. Analysis of Tools for Conducting Wireless Penetration Testing. Accepted for Publication at the Symposium on Privacy and Security Applications. PASST-09 Vancouver CA. August 29-31, 2009 12. Villegas G, and Garcia M. Wireless Penetration Testing. Proceedings of the Symposium on Privacy and Security Applications. Twenty-Fifth Annual Computer Security Applications Conference (ACSAC). Honolulu Hawaii. December 7-112009 13. Arce E. and Garcia M. “Use of Forensic Software Tools to Acquire Evidence from Mobile Devices” Proceedings of the The 2009 International Conference on Security and Management (SAM’ 2009). Las Vegas NV. July 13- 16, 2009 pp. 14. Garcia M., and Krause K. “Relevance of Ethics in Information Assurance” Proceeding of the VI International Conference on Engineering Education. March 8-11, 2009. Buenos Aires Argentina. [Type text] 15. Garcia M., Villegas G., and Alves S. “Wireless Penetration Testing.” Accepted for publication at the Hawaii International Conference on System Sciences. Waikoloa Big Island, Hawaii. January 5-8, 2009. 16. Fuentes F., Kar. D., and Garcia M. Biometrics and Vein Map authentication” E-Leader Krakow Conference. Krakow Poland - June 9-11, 2008. 17. Weitekamp A, Kar, Garcia M, and Tintera G. “Synchronous Key Generation from Chaotic Systems” Proceedings of the The 2008 International Conference on Security and Management (SAM’ 2008). Las Vegas NV. July 13- 18, 2008 pp. 437-442. 18. Krause K, and Garcia M. “Introducing Shades of Gray into otherwise Black and White World: Study of Ethics in Information Assurance.” Frontiers in Education. Racing Toward Innovation in Engineering Education. Saratoga Springs, New York. October 2225, 2008 19. Weitekamp A, Kar, Garcia M, and Tintera G. “Symmetric Key Cryptography Using Synchronized Chaotic Systems. Proceedings of the International Multi-Conference on Engineering and Technological Innovation. June 29th – July 2nd, 2008 Orlando Florida. pp. 135 – 140. 20. Garcia M, and Krause K. “The Development of Video Based Educational Materials in Ethics For Information Assurance.” 6th ASEE Global Colloquium on Engineering Education. Istanbul Turkey. October 1 – 4, 2007. 21. Garcia M, and Allawali F. “Using Data Mining to Detect Intrusions in Computer Networks.” 6th ASEE Global Colloquium on Engineering Education. Istanbul Turkey. October 1 – 4, 2007. 22. Bachnak R., Chakinarapu, R. Garcia M., and Kar D., “Programming a Microcontroller for Data Capture and Display,” Proceedings of the 16th Int. Conf. on software Engineering and Data Engineering, SEDE-2007, pp. 276-281, July 9-11, 2007, Las Vegas, NV. 23. Bachnak R. Chakinarapu R. Garcia M, Kar D, and Nguyen T. "Real-Time Acquisition and Display of Data and Video," Proceedings of the 7th Int. Conf. on Signal Processing, Computational Geometry, and Artificial Vision (ISCGAV '07), pp. 233-239, Vouliagmeni, Athens, Greece, August 24-26, 2007. 24. Krause K. and Garcia M. "The Development of Video Based Educational Materials in Ethics for Graduate Information Assurance and Security Curriculum" accepted for presentation and publication at the E-Leader conference, Prague, June 11-13, 2007 25. Krause K. and Garcia M. “Using Case Studies as an Approach to Teach Information Assurance Ethics.” Proceedings of the 8th International Conference on Information Technology Based Higher Education and Training. July 10-13, 2007. Kumamoto, Japan. Pp.135 26. Allawali F. and Garcia M. “Using Data Mining to Detect Intrusions in Computer Networks.” 2007 Proceedings of the ASEE Annual Conference and Exposition. Information Systems Division. June 24-27, 2007. Honolulu Hawaii. AC 2007-173 pp 112 27. Krishnamoorthy R. and Garcia M. “Active Change Auditing and Integrity Verification System Using MD5 Hashing.” 2007 ASEE Annual Conference and Exposition. Information Systems Division. June 24-27, 2007. Honolulu Hawaii. 28. Devi U. K., and Garcia M. “Ethical Hacking.” Accepted for publication at the FIE 2007 Frontiers in Education Conference. Milwaukee, Wisconsin October 10-13, 2007. [Type text] 29. Garcia M, Dirks M. and Weatherson M. “How to Defend Against Identity Theft, Phishing, and Web Spoofing” E-LEADER conference. Hong Kong, January 2 – 4, 2007. http://www.g-casa.com/E_Leader_HongKong_Program.htm 30. Garcia M, Cisneros R, and Bliss D. “Password Auditing Tools.” Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 – 12, 2006- pp. 331-338 31. Nerlimarla A. and Garcia M. “Biometric Authentication Tool for User Identification.” Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 – 12, 2006 pp. 287-293 32. Garcia M. and Durasaimy K. “SQL Injection Attacks and Prevention Techniques.” Proceedings of the 5th ASEE Global Colloquium on Engineering Education. Rio de Janeiro Brazil. October 9 – 12, 2006- pp. 343 -355 33. Garcia M. “How to Defend Against Identity Theft Attacks.” 2006 Alaska Information Assurance Workshop. September 5-6. Fairbanks, Alaska. 34. Mardan M. and Garcia M. "DDoS Attacks Flooding Networks All Over the World" Accepted for presentation at the The 10th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2006. Orlando Fl, July 16-19 2006 35. Garcia M “Network Intrusion Detection and Prevention Using Eaglex & Nuzzler” Accepted for presentation at the The 10th World Multi-Conference on Systemics, Cybernetics and Informatics: WMSCI 2006. Orlando Fl, July 16-19 2006 36. Garcia M, and Agarwal S. “What to Teach in Computer Ethics” Proceedings of the 7th International Conference on Information Technology Based Higher Education and Training” Sydney Australia. July 10 – 13 2006 37. Garcia M, Cisneros R, and Bliss D. “Password Auditing Tools.” 2006 ASEE Annual Conference and Exposition. Information Systems Division. June 18-21, 2006. Chicago Illinois. 38. Nerlimarla A. and Garcia M. “Biometric Authentication Tool for User Identification.” 2006 ASEE Annual Conference and Exposition. Information Systems Division. June 1821, 2006. Chicago Illinois. 39. Garcia M. and Durasaimy K. “SQL Injection Attacks and Prevention Techniques.” 2006 ASEE Annual Conference and Exposition. Computers in Education Division. June 18-21, 2006. Chicago Illinois. 40. Wilson I. P. and Garcia M. “Biometrics as a Cryptographic Key Generator” Hawaii International Conference on System Sciences. January 4 – 7, 2006. 41. Dark. M, Garcia M, Qing, Y, Ghansah I, .Chen J, Lee H, and Shing C. “Adaptation of a State of the Art Computer Forensics Course.” Proceedings of the The 8th International Conference for Young Computer. Beijing University of Technology. Beijin China, September 20-22, 2005. 42. Garcia M, Gopal G., Dick J., Swaminathan P., Sunil K. “Rule-based intrusion detection system based on SNORT.” Network / Computer Security Workshop. Bethlehem PA, August 4-5th., 2005. 43. Garcia M, Dark M, Yuan Q, Ghansah I, Chen J, Shing C, and Lee H. “Adaptation of a Computer Forensics Course.” Proceedings of the 6th International Conference on Information Technology Based Higher Education and Training (ITHET 2005). July 7 – 9 2005. Dominican Republic. [Type text] 44. Hwang E. and Garcia M. “An Image Fusion System” Accepted for presentation at the IASTED International Conference on Artificial Intelligence and Applications (AIA 2005), February 14 - 16, 2005, Innsbruck, Austria. 45. Aijaz A. and Garcia M. “Applications of Artificial Intelligence to Intrusion Detection” Proceedings of the Internet and Multimedia Systems and Applications (EuroIMSA 2005) Grindelwald Switzerland. Paper 462-110 pp. 281- 286 February 21 – 23 2005. 46. Young L. and Garcia M. “Using Recursion to Exploit Buffer Overflow”. IADIS International Conference Applied Computing 2005. Algarave Portugal, February 22 – 25 2005. 47. Tomar A. and Garcia M. “Organic Compounds Qualitative Analysis Expert System” 2005 ASEE Annual Conference and Exposition. Emerging Trends in Engineering Education Division. June 12-15, 2005. Portland Oregon 48. Balasubramanian A. Pundir H. Kankanala V. and Garcia M. “Enforcing Information Assurance Using Biometrics” 2005 ASEE Annual Conference and Exposition . Computers in Education Division. June 12-15, 2005. Portland Oregon 49. Young L. and Garcia M Configuring Modular Hi-Rise Fan Coil Units Using CLIPS. 2005 ASEE Annual Conference and Exposition . Computers in Education Division. June 12-15, 2005. Portland Oregon 50. Pinnenti L., Kankanala V., Chada K. and Garcia M. “Disease Diagnostic Tool Fish Therp for Identification and Detection of Bacterial and Parasitic Pathogens in Fish Husbandry” 2005 ASEE Annual Conference and Exposition. Ocean & Marine Engineering Division. June 12-15, 2005. Portland Oregon 51. Dark M, Yuan Q, Garcia M, Ghansah I, Chen J, Shing C. “Faculty-Curriculum Development: What Works and What Doesn’t.” Secure IT 2005 Conference. San Diego, California. April 19 – 22, 2005. 52. Manson D, Corey S. Fernandez J, Blyzka J, Farkas R, Partwo P, Garcia M “Beyond Bootcamps: A model for ongoing curriculum development collaboration for faculty attending an Information Assurance Bootcamp.” Secure IT 2005 Conference. San Diego, California. April 19 – 22, 2005 53. Young L. Aubuchon M, and Garcia M. “Recursion and Buffer Overflow in C++ Programming.” Proceedings of the Symposium on Computing at Minority Institutions. May 20 – 22, 2004 Orlando Florida. Pp 82 - 88 54. Garcia M, Gujjarlapudi R, and H,. Hatti “Organic Qualitative Expert System.” 2004 American Society for Engineering Education ASEE‘s 3rd annual International Meeting in Beijing, China, Tsinghua University,September 7-10. 2004 55. McCord L, McCord B, and Garcia M. “A Medical Expert System for Moderate Sedation.” Joint meeting of the International Conference on Education and Information Systems, Technologies and Applications (EISTA 2004) and the International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2004). Orlando FL. July 21-25, 2004. 56. Garcia M, Gujjarlapudi R, and H, “Organic Qualitative Expert System.” 2004 American Society for Engineering Education (ASEE 2004) Conference and Exposition Computers in Education Division. Salt Lake City, June 20 -23 57. Clements J, Shelton W, and Garcia M. “An Expert System for Pump Diagnosis” Frontiers in Education Conference (FIE 2004). Savannah Georgia, October 20 – 23 58. Steidley C, Dannelly S., Garcia M, and Pelala S, "Robots and Search Algorithm: RealWorld Applications for Students. Proceedings of the 2003 American Society for [Type text] Engineering Education Annual Conference & Exposition. Session 1320. Nashville Tennessee, June 22-25, 2003 59. Steidley C, Dannelly S., Garcia M, and Pelala S, "Robots and Search Methods: Abstraction Through Implementation", Proceedings of the American Society for Engineering Education Gulf- Southwest 2003 Conference, Session 3B, CD-ROM, Arlington, TX, March 2003. 60. Dannelly S., Steidley C., Garcia M., and Pelala S. "Physical World Applications of Search Algorithms for Students" Proceedings of the Fourteenth Annual Consortium for Computing Sciences in Colleges South Central Conference. Jackson, MS. April 11 - 12, 2003 pp. 95 - 104 61. Garcia M and Patterson-McNeill. "Learn How to Develop Software Using the Toy LEGO Mindstorms" 2002 ASEE Annual Conference and Exposition Proceedings. Boston Massachusetts, November 6 - 9 2002. Session S4D. Paper 1644.pdf 62. M. Johnson, Garcia M. Robot Navigation: "Determining the Shortest Path Using Enhanced Topological maps." Accepted for publication in the International Instrumentation, Systems, and Automation South American 2002 conference. Sao Paolo, Brazil, November 19-22 63. M. Johnson, Garcia M. Autonomous Intelligent Robots." Accepted for publication in the International Instrumentation, Systems, and Automation South American 2002 conference. Sao Paolo, Brazil, November 19-22 64. Dannelly S, Steidley C, and Garcia M. "Integrating the use of Sensors in the Curriculum." Accepted for publication in the International Systems and Automation Symposium, April 9-11 2002, Monterrey N.L. Mexico 65. Mendieta C. and Garcia M. "Predicting Primary Water Levels using Backpropagation and General Regression Neural networks. 2002 American Society for Engineering Education (ASEE) Annual Conference and Exposition Proceedings. Session 1532. Paper # 137. Montreal Canada, June 16-19 2002. 66. Starek M, Garcia M, Tomer M, Bhaskar K. " Minerals Identification using An Expert System." 2002 American Society for Engineering Education (ASEE) Annual Conference and Exposition Proceedings. Session 1532. Montreal Canada, June 16-19 2002. 67. Garcia M and Patterson-McNeill. "Learning How to Develop Software Using the Toy LEGO Mindstorms" Accepted for publication in the 7th Annual conference on Innovation and Technology in Computer Science Education (ITiCSE) Denmark, June 24-26, 2002. 68. Mendieta C. and Garcia M. "Comparison of Artificial Neural Networks Models for Predicting Tide Levels." Accepted for publication in the IASTED International Conference on Artificial Intelligence and Applications. Malaga Spain AIA 2002. September 9-12, 2002. 69. Garcia M. “ Blackboard: A WEB-assisted and WEB-Based Instruction Software." Proceedings of the IASTED International Conference on Internet and Multimedia Systems and Applications. Honolulu Hawaii, August 13-16, 2001. pp. 35- 40. 70. Garcia M, Steidley C. "Intelligent Diabetes Management." 2001 ASEE Annual Conference and Exposition Proceedings. Session 1520. Albuquerque New Mexico. June 24-27, 2001 71. Reyes E., Garcia M., and Steidley C. "Using Genetic Algorithms in the Global Wiring of Integrated Circuits." Proceedings of the Annual Conference of the American Society for Engineering Education, CD-ROM Session 3520, Paper 5, June 2000. Publications (Peer-Reviewed before 1999) [Type text] 1. Garcia M., Ellis, N., and Simmons D., "Intelligent Agents Applied to Software Management" International Symposium on Computer Science, November 11–13, 1998. pp. 63 – 69. Mexico D.F. 2. Muniz E., Escamilla J., Garcia M., “Arquitectura Distribuida de Agentes Para enlace de Intereses” XX Congreso Internacional de Ingenieria Electronica. ELECTRO 98 October 26–30, 1998. pp. 6–11. Chihuahua, Chihuahua, Mexico 3. Garcia, M., Ellis, N., and Simmons D., "A Knowledge Base System used to Predict Schedule, Cost, Effort, and Defects in a Software Development Process" 9th International Symposium on AI November 12-15 1996, Cancun, Mexico. pp. 306–314. 4. Garcia, M., Ellis, N., and Simmons, D., "Intelligent Software Life Cycle Phase Predictor" 8th International Symposium of AI. Monterrey, N.L., Mexico. October 1995, pp. 342 347. 5. Garcia, M., Ellis N., and Simmons D., " Intelligent Software Status Predictor" Fuzzy 95. November 7-9 1995, San Francisco Cal., pp. 15-1 - 15-8 6. Garcia, M., and Cantu, F., "Trouble Shooting Expert System for the Combustion of Steam Generators" The World Congress of Expert Systems. Orlando Florida December 16-19, 1991. 7. Garcia, M. and Gonzalez, S., "Design of a Power Plant Control System" Proceedings of the IEEE Mexicon 81 Vol. III. Guadalajara, Jalisco, Mexico. 8. Trevino, G., Madariaga A., and Garcia, M., "SECAL" Sistema Experto en Calderas VI Reunion Nacional de Inteligencia Artificial. Mexican Society of Artificial Intelligence Queretaro, Queretaro. Mexico. July 1989 pp. 463 – 470. Publications with Students. (Student Conferences) 1. Mallepally R. and Garcia M. IPhone Forensics Techniques. 5th Annual Graduate Scholarly Works Symposium. Corpus Christi TX, April 22, 2011. 2. Iker Okan Aker and Mario A. Garcia. Visualization in Computer Forensics. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 3. Pradeep Pothnak and Mario A. Garcia. Apple Forensics on Third Party Applications. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 4. Farath Fatima and Mario a. Garcia. Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 5. Akshara Upaluri and Mario A. Garcia Improvement in Digital Forensics with the basis of Reusability. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 6. Maria A. Basani and Mario A. Garcia. Improving Kerberos Security Protocol using Various Logics. 18th Annual Student Conference for Research & Creative Arts. Houston TX. April 25 -26, 2012 7. Srikanth Padakanti and Mario A. Garcia. Session Based Tunnelling in VPN using IPSec protocol. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 8. Aditya Cheruvu and Mario A. Garcia Identification and analysis of wormhole attacks in wireless networks. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 [Type text] 9. Chandupatla Druha Druthi and Mario A. Garcia Detection Techniques for Vulnerabilities in Web Services. 18th Annual Student Conference for Research & Creative Arts. Houston TX, April 25 -26, 2012 10. Rajavardhan Mallepally, Preethi Chittimalla, and Garcia Mario. iForensic Tool: The Ultimate iPhone Forensic Tool. 4th Annual Graduate Scholarly Works Symposium. Corpus Christi TX, April 23, 2010 11. Ruth Harding and Mario Garcia. A Forensics Analysis of Microsoft Windows Registry. 4th Annual Graduate Scholarly Works Symposium. Corpus Christi TX, April 23, 2010 12. Garcia Mario. “Computers Under Attack.” Instituto Tecnologico y de Estudios Superiores de Monterrey. Monterrey N.L. Mexico, April 18, 2008. 13. Arce E., Villegas G., and Garcia M. “Intrusion Detection Systems” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 14. Arce E., Villegas G., and Garcia M. How to select a PDA and a Wireless Card” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 15. Kothapally S, and Garcia M. Security Analysis in Steganography” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 16. Nalluri J, and Garcia M. “Attacks against Wireless Sensor Networks” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 17. Paladagu S, and Garcia M. “Forensics Analysis of Cellular Phones” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 18. Vangala R. K, and Garcia M. “ Security Faults in the Wireless Application Protocol” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 19. Dasari S, and Garcia M. “Bluetooth Vulnerabilities” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 20. Hayford A. O., and Garcia M. Wireless LAN Vulnerabilities” Fourteen Annual Student Conference for Research and Creative Arts. April 16-18, 2008. 21. Duarte A. and Garcia M. “ The Breakdown of Malware” Graduate Scholarly Works Symposium. March 29, 2008. 22. Sinclair A, and Garcia M. “Statistical-Based Intrusion Detection” Graduate Scholarly Works Symposium. March 29, 2008. 23. Sunke B. and Garcia M. Wireless Security Vulnerabilities” Graduate Scholarly Works Symposium. March 29, 2008. 24. Nalluri J. and Garcia M. “Public Key Cryptography” Graduate Scholarly Works Symposium. March 29, 2008. 25. Dang, M.D, and Garcia M. “ Vulnerability Analysis in Operating Systems” Graduate Scholarly Works Symposium. March 29, 2008. 26. Kanisetti R. and Garcia M. “ The Study of Vein Patterns for Biometric Security” Graduate Scholarly Works Symposium. March 29, 2008. 27. Ponnala A., Shaik A., and Garcia M. Vulnerabilities in Virtual Machines” Graduate Scholarly Works Symposium. March 29, 2008. 28. William B, Mahady A, and Garcia M. “Free Space Optics(FSO) Topology, Architecture, Data Transmission, Routing, and Future Developments.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007 29. Garcia M. Community Outreach. SSI Hub Open Standard Workshop. Clear Lake University, Houston TX, March 3 – 5, 2007 30. Garcia M. Security Courses ISE/SSIP Hub Workshop. Dallas Texas August 3 – 5, 2007 [Type text] 31. Yashwanth C, and Garcia M. “Game Systems Forensics.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007 32. Garimella A. S. and Garcia M. “Overview and Analysis of Forensics Tools.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007 33. Paladagu R. S. and Garcia M. “A study on Honeypoys.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007 34. Vuppala K. and Garcia M. “Symbian Operating System for Mobile Devices.” AAAS Swarm 82nd Annual Meeting and University of Houston Clear Lake 13th Annual Student Conference for Research and Creative Arts. Clear Lake Houston, April 18-22, 2007 35. Dopierala R. and Garcia M. “Biometric Security.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi. 36. Ramana V. and Garcia M. “Buffer Overflow in C/C++ and Security Vulnerabilities.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi. 37. Gurrala P. and Garcia M. “Data Mining and Security” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi. 38. Smith S. and Garcia M. “Digital Forensics- New Developments in a Rapidly Evolving Field.” Graduate Student Research Symposium. April 21, 2007, Texas A&M UniversityCorpus Christi. 39. Gilford R. and Garcia M. “Security of the Stream Control Transmission Protocol STCP.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi 40. Krishnappa H. and Garcia M. “Mobile E-commerce Security, Components and Design.” Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi 41. McConnell N, Mahdy A., and Garcia M. Mobile WiMax. Graduate Student Research Symposium. April 21, 2007, Texas A&M University-Corpus Christi 42. Garcia M. Organic Qualitative Expert System “CSA Mechanical & Transportation Engineering Abstracts. 2007 43. Garcia M. “Password Cracking: A Dilemma Case Study in Computer Security.” University at Buffalo, Buffalo New York, May 25, 2006 44. Fonseca F. and Garcia M. “Computer Authentication using Biometrics” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. 45. DeLoera S and Garcia M. “Biometrics Fingerprint Attainment”. Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. 46. Cao Steve and Garcia Mario. “An Introduction to Honeypots” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. 47. Krishnappa H.G. and Garcia M. “Biometrics Iris Recognition” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. [Type text] 48. Chakinarapu R. and Garcia M. “Computer Forensics” Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. Twelfth Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 19 - 20 2006. 49. Reddiplalli V. K. and Garcia M. “Role of Artificial Neural Networks in Intrusion Detection” 50. O’Brien T, and Garcia M. “Anti-Virus effectiveness.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005. 51. MacLeod A. and Garcia M. “Finding Vulnerabilities in Computers.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005. 52. Hytnen R. and Garcia M. “An Analysis of Wireless Security Fidelity.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005. 53. Landois L. and Garcia M. Use of Artificial Intelligence for Intrusion Detection. Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005. 54. Gilford R. and Garcia M. “What to Know When Protecting Computer Networks.” Eleventh Annual Student Conference for Research and Creative Arts. University of Houston-Clear Lake, Houston TX, April 20 – 21 2005. 55. Balasubramanian A. Pundir H. Kankanala V. and Garcia M. “Enforcing Information Assurance Using Biometrics” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004 56. Duraisamy K., Allawali F., and Garcia M. “An Expert System for Corn Disease Identification” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004 57. Allawali F. and Garcia M. “Computer Intrusion Detection Using Data Mining” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004 58. Durbha K. and Garcia M. “Threats and Facility Requirements in Physical Security” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004 59. Shroff N., and Garcia M. “Secure Socket Layer (SSL) Protocol; The Undisputed Heavyweight Champion for web Site Authentication and Encryption of Transactional data” The Texas A&M University System 2nd Annual TAMUS Pathways Student Research Symposium. October 14 – 15 2004 60. Hakl A. and Garcia M. “Implementation of two Algorithms to Compare Public and Private Key Cryptography.” Tenth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2004 61. Aijaz A. and Garcia M. “Signature-based Network Intrusion Detection System Using JESS (SNIDJ.” Tenth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2004 62. Strickland J., Fuqua S.and Garcia M. “Social Engineering in the University Setting Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003. [Type text] 63. Hakl A. and Garcia M. “Public vs. Private Key Cryptography.” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003. 64. Ross1, A. Trevino F. and Garcia M. “Computer Viruses, Worms, and Trojan Horses.” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003. 65. Peña M. and Garcia M. “Hacking Tools: Friend or Foe?” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003. 66. AuBuchon M. and Garcia M. Program Coding Vulnerabilities: The Buffer Overflow. Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003. 67. Liza M. and Garcia M. “Iris Recognition: Society and it’s Anxiety” Third Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 8, 2003. 68. Krishna B, Vangala K, and Garcia M, CORN-EX: An Expert System for Corn Insect Damage Diagnosis . Ninth Annual Conference for Research & Creative Arts University of Houston-Clear Lake. April 23-24, 2003 69. Desiraju R, Jana K, and Garcia M, An Expert System For Inorganic Elements Ninth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2003 70. Shih-kai H. and Garcia M. An Expert System For PRECAST and PRESTRESS CONCRETE. Ninth Annual Conference for Research & Creative Arts. University of Houston-Clear Lake. April 23-24, 2003 71. Laurel C., Fuentes F, J. Johnson J., and Garcia M "Efficiencies of LEGO Mindstorms Programming Languages" 2003 National Conference on Undergraduate Research (NCUR 2003). UTAH. March 2003. 72. Laurel C, Fuentes F., and Garcia M. "Fundamental Computer Programming with LEGO Mindstorms." Undergraduate Research Symposium. Texas A&M University-Corpus Christi. November 2, 2002. 73. Daggula K.R., and Garcia M. Disease Diagnostic Identification and Recommendations for the Shrimp Industry." Undergraduate Research Symposium. Texas A&M UniversityCorpus Christi. November 2, 2002 Publications Before 1999 1. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Software Engineering Class Analysis” Report Number: CSL-TR-28-95. Software Process Improvement Laboratory, Texas A&M University, January 26, 1995. 2. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Measurement Ranges”, Working Paper. Software Process Improvement Laboratory, Texas A&M University, November 30 1996. 3. Garcia, M., Ellis, N., Kuo, W., and Simmons, D., “Software Engineering Class Analysis” Working Paper. Software Process Improvement Laboratory, Texas A&M University, December 20, 1996. 4. Garcia, M., "Software Management" Technical Report, 1995, Cognitive Systems Laboratory. Texas A&M University. 5. Garcia, M., "Estimating Software Size" Technical Report, 1995, Cognitive Systems Laboratory. Texas A&M University. 6. Garcia, M., "Improving Software Reliability Using Software Metrics" Technical Report, 1995, Cognitive Systems Laboratory. Texas A&M University. [Type text] 7. Garcia, M., "How to implement a Metrics Program" Technical Report, 1995, Cognitive Systems Laboratory, Texas A&M University. 8. Goodman, S., Garcia, M., and Ellis, N., "Intelligent Assistants/Associates Overview. Editorship (Book Chapters) 1. Garcia, M., and Cantu, F., SEMAT, An Expert System for Diagnosing problems in Tooth Paste Tube Machines. Operational Expert Systems in Mexico. F. Cantu. Pergamon Press, 1991, pp. 74 – 85. 2. Garcia, M., and Cantu, F., SECAL, An Expert System for Diagnosing Problems in Boiler Operation. Operational Expert Systems in Mexico. Cantu, F., Pergamon Press, 1991, pp. 7- 26 3. Instructor materials for the book: Computer Forensics: Incident Response Essentials. Warren G. Kruse and Jay Heiser. Addison Wesley. Presentations (invited talks) 1. Analysis and Investigation of SCAP tools (July 13) Naval Undersea Warfare Center, Newport RI. July13, 2012. 2. Defense in Depth – Applications of Artificial Intelligence Techniques to Intrusion Prevention. Naval Undersea Warfare Center, Newport RI. July17, 2012. 3. Challenges in Computer Forensics: A Research Perspective. Naval Undersea Warfare Center, Newport RI. August 23 2011. 4. Analysis of Computer Forensics tools. Naval Undersea Warfare Center, Newport RI. August 12 2011. 5. Analysis of Educational Testing Service ETS tools and its incorporation into Blackboard ETS Faculty Symposium. June 2011. Princeton NJ. 6. Computers Under Attack. Instituto Tecnologico y de Estudios Superiores de Monterrey. Monterrey Mex, April 14, 2008. 7. Simposium Internacional de Sistemas Computacionales. Instituto Tecnologico de Saltillo, Saltillo Coahuila Mexico. Octubre 2001 8. Simposium Internacional de Sistemas Computacionales. Instituto Tecnologico de Saltillo, Saltillo Coahuila Mexico. Octubre 1998 9. II Jornadas Academicas. Conferencista magistral. Instituto Tecnologico de Lerdo. Cd. Lerdo Durango, Mexico April 1998 Paper Reviewer 1. 2008 Annual International Journal of Computer Mathematics 2. 2008 Hawaii International Conference on Systems Science HICSS-40 3. IASTED Advances in Computer Science and Technology ACST 2006 4. Technical paper reviewer for the Consortium for Computing in Small College: Seventeen Annual South Central Conference. 2006 5. ASEE 2006 6. SIGCSE 2006. 7. Technical paper reviewer ITiCSE 2005 8. Communications of the ACM, 2005 9. Hawaii International Conference on System Sciences Author Services, 2005 10. Technical paper reviewer for the IASTED Applied Informatics 2004 11. Technical paper reviewer for Circuits, Signals, and Systems (CSS 2004) 12. Technical paper reviewer for the IASTED Applied Informatics 2003 13. Technical paper reviewer for the Consortium for Computing in Small College: Fourteen Annual South Central Conference. 2003 [Type text] 14. Technical paper reviewer for the Consortium for Computing in Small College: Thirteen Annual South Central Conference. 2002 15. Technical paper reviewer for the IASTED Applied Informatics 2002 16. Technical paper reviewer for ITiCSE 2002 17. Technical paper reviewer for ASEE 2002 18. Technical paper reviewer for FIE 2002 19. Technical paper reviewer for the Consortium for Computing in Small College: Twelfth Annual South Central Conference. 2001 20. Technical paper reviewer for the Consortium for Computing in Small College: Eleventh Annual North East Conference. 2001 Grant Reviewer 1. NSF-Scholarship for Service – SFS. May 5-7, 2014 2. NSF Graduate Research Fellowship Evaluation. Washington DC. January 2013 3. NSF NDSEG and SMART. Washington DC January 2013 4. DoD – ASEE Graduate Research Fellowship Evaluation. Washington DC. February 2012 5. NSF Graduate Research Fellowship Evaluation. Washington DC. February 2011 6. NSF Graduate Research Fellowship Evaluation. Washington DC. February 2010 7. NSF Graduate Research Fellowship Evaluation. Washington DC. February 2009 8. National Science Foundation Course, Curriculum, and Laboratory Improvement Program. Washington DC July 20 2009. 9. Ethics and values in Science, Engineering and technology Washington DC. May 2008 10. Graduate Research Fellowship Evaluation. Washington DC. February 2008 11. Minority Serving Institutions – Department of Homeland Security. Washington DC. September 2007. 12. Ethics and values in Science, Engineering and technology Washington DC. May 2007 13. Graduate Research Fellowship Evaluation. Washington DC. February 2007 14. NSF CCLI Phase II and III Washington DC, March 2006 15. NSF 2005 Graduate Research Fellowship Program. Washington DC, February 2005. 16. Review Proposals submitted to the National Science Foundation Cyber Trust Program. Washington DC, June 2004. 17. Review Proposals submitted to the National Science Foundation Course, Curriculum, and Laboratory Improvement Program. Washington DC July 20 2003. 18. Review Proposals submitted to the National Science Foundation Adaptation and Implementation Program. Washington DC. January 2003. 19. Review Proposals submitted to the National Science Foundation Course, Curriculum, and Laboratory Improvement Program. Washington DC July 20 2002. 20. Review Proposals submitted to the National Science Foundation Course, Curriculum, and Laboratory Improvement Program. Washington DC July 20 2001. 21. Review of Panel Proposals submitted to the National Science Foundation Division of Undergraduate Education. Washington DC July 2000. 22. Review NSF ITR proposals. San Francisco Cal. May 2000. Book Reviewer 1. Review 12 Chapters for the book: Computational Intelligence.: Theory and Implementation. Morgan Kaufman Publishers. October 2001 - February 2002 2. Review two chapters from a CS-2 with Java entitled "A Basic Collection Class and the List Abstract data Type" Scott/Jones. January 2002. [Type text] 3. Review of a distance education site for the book "Starting out with C++. Tony Gaddis. Scott Jones. October 18, 2001 4. Review two chapters for a CS2 text using Java, entitled "Introduction: What We Will Study and Why" and "Fundamental Data Structures". Scott/Jones Publishing August 16, 2001 5. Review of a chapter for a CS2 text using Java entitled "The List Abstract Data Type." Scott/Jones Publishing March 12, 2001 6. Review three chapters on Patterns Based Software engineering. Scott/Jones Publishing February 26, 2001. 7. Review of an outline for a prospective CS2 text. Scott/Jones Publishing May 8, 2000 Professional Service 1. IASTED International Program Committee Member on Wireless and Optical Communications (WOC) 2007) 2. IASTED International Program Committee Member (IPC) “Internet and Multimedia Systems and Applications (IMSA 2008) 3. Board of Directors of the Software Engineers Association 2007 4. Chair of the session: “Community Outreach” Shared Software Infrastructure SSI-Hub. Clear Lake University. March 3 – 6, 2006. 5. Member of the IEEE Computer Society Taylor Booth Education Award 2005, 2006 6. Chair of the Outreach committee of the SSI Hub. 2006 7. Board of directors of the Shared Software Infrastructure SSI – Hub project. Texas A&M – IBM. 2006. 8. Co-chair: 1st Symposium on Information Assurance. Texas A&M University-Corpus Christi. Corpus Christi TX, January 29 2005 9. Planning committee for the ASEE Gulf Southwest Conference 2005, Corpus Christi TX, 10. Paper session chair. Copyright, Watermarking, and Security. IASTED International Conference on Internet and Multimedia Systems and Applications. February 21 – 23, 2005 11. Graduate Research Fellowship Evaluation. Washington DC. February 2005 12. Paper session chair. Frontiers in Education 2004. Savannah Georgia, October 20 – 23 13. Member of the IASTED Technical Committee on "Artificial Intelligence and Expert Systems" 2001-2004 14. Member of the TRUST Identity Theft group (Stanford, Berkeley, Cornell, Vanderville) 15. Member of the IEEE University/College - Service 1. International Education Council Committee 2010 2. Study Abroad Committee 2007 - 2010 3. Faculty Senate 2002 – 2006 4. Senate Faculty Affairs Committee 2002 – 2006 5. Senate Faculty Budget Committee 2004 – 2006 6. Senate Faculty Affairs Committee Chair2005 – 2006 7. Senate Executive Committee 2005 - 2006 8. University Sports Committee – 2000 – 2006 9. International Education Scholarship Committee member – 2006 – 2007 10. WEB Courseware Research Committee 2003 11. College Curriculum Committee 12. College Tenure Committee 2006 – 2010 [Type text] Department Service 1. Computing Sciences Tenure Committee Chair – August 2007 – July 2008; 2010 2. Computing Sciences Graduate Studies Committee Chair - August 2007 – July 2008 3. Computing Sciences Chair Search Committee member 2007 4. ABET committee member – 2005 – 2007 5. Department Tenure Committee – 2006 – 2007 6. Department Mid-term Review Committee 2006 - 2007 7. Computing Sciences Security Policy Committee member – 2006 – 2007 8. Computing Sciences Network Security research group – 2006 – 2011 9. Computing Sciences Software Engineering Research group – 2006 – 2007 10. Computing Sciences BAAS program review 2007 11. Engineering Faculty Search Committee – 2006 12. Computer Science Network Administrator Search Committee 2005 13. Computer Science Graduate Program Review 2005 Awards Faculty Fellowship Summer Institute in Israel 2010. FF2Israel June 9th to 17th.