default search action
Guillermo A. Francia III
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Guillermo Francia III, Eman El-Sheikh:
Open Platform Infrastructure for Industrial Control Systems Security. ACR 2024: 233-243 - [c21]Kyle Stein, Arash Golibagh Mahyari, Guillermo A. Francia III, Eman El-Sheikh:
A Transformer-Based Framework for Payload Malware Detection and Classification. AIIoT 2024: 105-111 - [i3]Kyle Stein, Arash Golibagh Mahyari, Guillermo Francia III, Eman El-Sheikh:
A Transformer-Based Framework for Payload Malware Detection and Classification. CoRR abs/2403.18223 (2024) - [i2]Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh:
Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach. CoRR abs/2409.11254 (2024) - [i1]Kyle Stein, Arash Golibagh Mahyari, Guillermo Francia III, Eman El-Sheikh:
Revolutionizing Payload Inspection: A Self-Supervised Journey to Precision with Few Shots. CoRR abs/2409.18219 (2024) - 2021
- [j8]Raid W. Amin, Hakki Erhan Sevil, Salih Kocak, Guillermo A. Francia III, Philip Hoover:
The Spatial Analysis of the Malicious Uniform Resource Locators (URLs): 2016 Dataset Case Study. Inf. 12(1): 2 (2021) - [j7]Tirthankar Ghosh, Guillermo A. Francia III:
Assessing Competencies Using Scenario-Based Learning in Cybersecurity. J. Cybersecur. Priv. 1(4): 539-552 (2021) - 2020
- [c20]Bertony Bornelus, Hongmei Chi, Guillermo A. Francia III:
Integrating Blockchain Technology in Healthcare via Active Learning. ACM Southeast Regional Conference 2020: 122-126
2010 – 2019
- 2018
- [p1]Jaedeok Kim, Guillermo A. Francia III:
A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems. Computer and Network Security Essentials 2018: 521-538 - 2015
- [j6]Jeffrey S. Zanzig, Guillermo A. Francia III, Xavier P. Francia:
A Consensus of Thought in Applying Change Management to Information System Environments. Int. J. Inf. Syst. Model. Des. 6(4): 24-41 (2015) - 2014
- [c19]Guillermo A. Francia III, Jay Snellen III:
Laboratory projects for embedded and control systems security. InfoSecCD 2014: 13:1 - 2013
- [j5]Guillermo A. Francia III, Kihyun Kim, Byungoh Ahn, Sen Xin Zhou:
A Formal Framework for Patch Management. Int. J. Interdiscip. Telecommun. Netw. 5(2): 18-31 (2013) - [c18]Ming Yang, Kai Qian, Minzhe Guo, Prabir Bhattacharya, Guillermo A. Francia III, Li Yang:
Enhance computer networks learning with hands-on mobile device based labware (abstract only). SIGCSE 2013: 732 - 2012
- [c17]Christopher Smith, Guillermo Francia III:
Security fuzzing toolset. ACM Southeast Regional Conference 2012: 329-330 - [c16]Guillermo Francia III, David Thornton, Thomas Brookshire:
Wireless vulnerability of SCADA systems. ACM Southeast Regional Conference 2012: 331-332 - 2011
- [c15]Guillermo A. Francia III:
Critical infrastructure security curriculum modules. InfoSecCD 2011: 54-58
2000 – 2009
- 2009
- [j4]Ming Yang, Monica A. Trifas, Guillermo A. Francia III, Lei Chen:
Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy. Int. J. Inf. Secur. Priv. 3(3): 37-54 (2009) - [c14]Guillermo A. Francia III, Suprasith Jarupathirun:
Security Metrics-Review and Research Directions. Security and Management 2009: 441-446 - [c13]Guillermo Francia III, Cheneil Sanders:
Applied Data Mining in a Scholarship Program. FECS 2009: 336-340 - 2007
- [j3]Guillermo A. Francia III, Rahjima R. Francia:
An Empirical Study on the Performance of Java/.Net Cryptographic APIs. Inf. Secur. J. A Glob. Perspect. 16(6): 344-354 (2007) - [j2]Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins:
The Design and Implementation of an Automated Security Compliance Toolkit: A Pedagogical Exercise. J. Digit. Forensics Secur. Law 2(4): 59-76 (2007) - [c12]Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins:
The design and implementation of an automated security compliance toolkit: a pedagogical exercise. InfoSecCD 2007: 4:1 - [c11]Zizhong Chen, Ming Yang, Guillermo A. Francia III, Jack J. Dongarra:
Self Adaptive Application Level Fault Tolerance for Parallel and Distributed Computing. IPDPS 2007: 1-8 - [c10]Ming Yang, Nikolaos G. Bourbakis, Zizhong Chen, Guillermo A. Francia III:
An efficient packet loss recovery methodology for video-over-IP. SIP 2007: 270-275 - 2006
- [c9]Guillermo A. Francia III, Tyler S. Gomez:
Steganography obliterator: an attack on the least significant bits. InfoSecCD 2006: 85-91 - [c8]Guillermo A. Francia III, Monica A. Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott:
Visualization and management of digital forensics data. InfoSecCD 2006: 96-101 - 2005
- [c7]Guillermo A. Francia III, Keion Clinton:
Computer Forensic Tools and Techniques. Security and Management 2005: 248-252 - [c6]Guillermo A. Francia III, Le Phuong, Aditya Kilaru:
Wireless Security Tools. ICWN 2005: 562-568 - 2004
- [c5]Guillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi:
Network Performance Measurement Tools. Communications in Computing 2004: 25-32 - [c4]Guillermo A. Francia III:
An Intelligent RFID Based Wireless Tools and Asset Tracking System. International Conference on Wireless Networks 2004: 651-657 - 2003
- [c3]Guillermo A. Francia III, Aditya Kilaru, Le Phuong, Mehul B. Vashi:
A Performance Comparison of Encryption Algorithms. Security and Management 2003: 644-649 - [c2]Guillermo A. Francia III, Grant Greenwood:
A Wireless Maintenance Identification System. International Conference on Wireless Networks 2003: 160-168 - [c1]Guillermo A. Francia III:
A Wireless Sensor Network. International Conference on Wireless Networks 2003: 306-314 - 2000
- [j1]Peter Flusser, Guillermo A. Francia III:
Derivation and Visualization of the Binomial Theorem. Int. J. Comput. Math. Learn. 5(1): 3-24 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint