Guillermo A. Francia, III, Ph.D.
Director, Research and Innovation
Professor of Electrical and Computer Engineering
JSU Distinguished Professor Emeritus
​
Supervised MS(Computer Systems and Software Design)Theses
-
Rosier, John. "Enhancing the Jacksonville State University Advising System: The JSU Online DARS System." December, 2002.
-
Hosmer, Chris. "Music Theory Supplement: An Approach Using Java Applets and the Internet." May, 2003.
-
Ponder, Sean. "Improving IP Address Management." May, 2003.
-
Kazi, Mohiuddin. "Application of Weka (Data Mining) in Network Security." December, 2003.
-
Xu, Fan. "Applied Data Mining." April, 2004.
-
Crawford, Leland. "Network Information and Management System." April, 2004.
-
Greenwood, Grant. " Benchmarking Wireless Network Performance in a Manufacturing Environment." April, 2004.
-
Vashi, Mehul. "The Design and Analysis of a Dynamic Hybrid Ad-hoc Wireless Routing Algorithm." April, 2004.
-
Kilaru, Aditya. "Wireless Intrusion Detection System." June, 2004.
-
Holland, Marcia. "Automated Wireless Assessment System." December, 2004.
-
Phuong, Le. "Security Tools for Wireless Networks." December, 2004.
-
Donti, Sateesh. "An Efficient Web Searching through Intelligent Text Mining." December, 2004.
-
Minhas, Omer. "Secure Software Tool for Java." April, 2005.
-
Clinton, Keion. "Design and Implementation of a Computer Forensic Analysis Laboratory." June, 2005.
-
Velkour, Sirish. "Network Intrusion Detection Using Oracle Data Miner." May, 2006.
-
Bullard, Jennifer. "Supply Chain Analysis using Data Mining Techniques." December, 2006.
-
Nguyen, Vu. "A Data Mining and Visualization Approach to Host-based Intrusion Detection." May, 2007.
-
Wade, Jane M."A Web Vulnerability Assessment of Jacksonville State University's Public Presence." December, 2008.
-
Zanzig, Jeffrey S."Use of an Expert System for Ensuring Organizational Compliance with Legislation Concerning Techmological Security." December, 2008.
-
Sanders, Cheneil. "Security Performance Dashboard System." December 2010.
-
Salman, Said. "Security Vulnerability Assessment of Smartphones and Mobile Devices." April 2012.
-
Brown, Phillip. "Direct Contract Carrier (DCC) Business Intelligence." April 2012.
-
Abe, Etsuko. "Web based Scheduling-Planning Kid Therapies." April 2012.
-
Smith, Christopher. "Vulnerability Assessment Toolkit." May 2012.
-
Brookshire, Jr.,Thomas. "Development and Implementation of a Control System Security Toolkit." April 2013.
-
Chen, Weicong. "Human Machine Interface (HMI) for a Portable Control System Security Laboratory." December 2013.
-
Dempsey, Dylan. "Design, Implementation, and Validation of a Secure Operating System for Industrial Control Systems." December 2013.
-
Dawson, Joshua. "Automation of Security and Application Log Analysis to Detect Intrusions." April 2014.
-
White, Thomas Drew. "Network Access Control System for JSU." April 2014.
-
He, Xinwen. "Access Control and Authentication System for Wireless Industrial Robotic System Controls." April 2014.
-
Lamrani, Imane. "Simulation of Attacks on the Security of Industrial Control Systems." April 2014.
-
Wang, Dan. "Using Data Mining Techniques for Fraud Detection," April, 2016.