top of page
Supervised MS(Computer Systems and Software Design)Theses
  1. Rosier, John. "Enhancing the Jacksonville State University Advising System: The JSU Online DARS System." December, 2002.

  2. Hosmer, Chris. "Music Theory Supplement: An Approach Using Java Applets and the Internet." May, 2003.

  3. Ponder, Sean. "Improving IP Address Management." May, 2003.

  4. Kazi, Mohiuddin. "Application of Weka (Data Mining) in Network Security." December, 2003.

  5. Xu, Fan. "Applied Data Mining." April, 2004.

  6. Crawford, Leland. "Network Information and Management System." April, 2004.

  7. Greenwood, Grant. " Benchmarking Wireless Network Performance in a Manufacturing Environment." April, 2004.

  8. Vashi, Mehul. "The Design and Analysis of a Dynamic Hybrid Ad-hoc Wireless Routing Algorithm." April, 2004.

  9. Kilaru, Aditya. "Wireless Intrusion Detection System." June, 2004.

  10. Holland, Marcia. "Automated Wireless Assessment System." December, 2004.

  11. Phuong, Le. "Security Tools for Wireless Networks." December, 2004.

  12. Donti, Sateesh. "An Efficient Web Searching through Intelligent Text Mining." December, 2004.

  13. Minhas, Omer. "Secure Software Tool for Java." April, 2005.

  14. Clinton, Keion. "Design and Implementation of a Computer Forensic Analysis Laboratory." June, 2005.

  15. Velkour, Sirish. "Network Intrusion Detection Using Oracle Data Miner." May, 2006.

  16. Bullard, Jennifer. "Supply Chain Analysis using Data Mining Techniques." December, 2006.

  17. Nguyen, Vu. "A Data Mining and Visualization Approach to Host-based Intrusion Detection." May, 2007.

  18. Wade, Jane M."A Web Vulnerability Assessment of Jacksonville State University's Public Presence." December, 2008.

  19. Zanzig, Jeffrey S."Use of an Expert System for Ensuring Organizational Compliance with Legislation Concerning Techmological Security." December, 2008.

  20. Sanders, Cheneil. "Security Performance Dashboard System." December 2010.

  21. Salman, Said. "Security Vulnerability Assessment of Smartphones and Mobile Devices." April 2012.

  22. Brown, Phillip. "Direct Contract Carrier (DCC) Business Intelligence." April 2012.

  23. Abe, Etsuko. "Web based Scheduling-Planning Kid Therapies." April 2012.

  24. Smith, Christopher. "Vulnerability Assessment Toolkit." May 2012.

  25. Brookshire, Jr.,Thomas. "Development and Implementation of a Control System Security Toolkit." April 2013.

  26. Chen, Weicong. "Human Machine Interface (HMI) for a Portable Control System Security Laboratory." December 2013.

  27. Dempsey, Dylan. "Design, Implementation, and Validation of a Secure Operating System for Industrial Control Systems." December 2013.

  28. Dawson, Joshua. "Automation of Security and Application Log Analysis to Detect Intrusions." April 2014.

  29. White, Thomas Drew. "Network Access Control System for JSU." April 2014.

  30. He, Xinwen. "Access Control and Authentication System for Wireless Industrial Robotic System Controls." April 2014.

  31. Lamrani, Imane. "Simulation of Attacks on the Security of Industrial Control Systems." April 2014.

  32. Wang, Dan. "Using Data Mining Techniques for Fraud Detection," April, 2016.

bottom of page