Computer and network security essentials K Daimi, G Francia, L Ertaul, LH Encinas, E El-sheikh Springer, 2018 | 45 | 2018 |
Gamification of information systems and security training: Issues and case studies D Thornton, G Francia Information Security Education Journal 1 (1), 16-24, 2014 | 37 | 2014 |
Security best practices and risk assessment of SCADA and industrial control systems GA Francia III, D Thornton, J Dawson Proceedings of the international conference on security and management (SAM), 1, 2012 | 34 | 2012 |
Innovations in cybersecurity education K Daimi, G Francia III Springer, 2020 | 21 | 2020 |
Computer forensics laboratory and tools GA Francia, K Clinton Journal of Computing Sciences in Colleges 20 (6), 143-150, 2005 | 21 | 2005 |
The design and implementation of a heterogeneous computer networking laboratory GA Francia III, RK Smith Proceedings of the fourteenth annual consortium on Small Colleges …, 2000 | 19 | 2000 |
Steganography obliterator: an attack on the least significant bits GA Francia III, TS Gomez Proceedings of the 3rd annual conference on Information security curriculum …, 2006 | 17 | 2006 |
Derivation and visualization of the binomial theorem P Flusser, GA Francia International Journal of Computers for Mathematical Learning 5, 3-24, 2000 | 17 | 2000 |
Self adaptive application level fault tolerance for parallel and distributed computing Z Chen, M Yang, G Francia, J Dongarra 2007 IEEE International Parallel and Distributed Processing Symposium, 1-8, 2007 | 15 | 2007 |
Applied image processing to multimedia information security GA Francia, M Yang, M Trifas 2009 International Conference on Image Analysis and Signal Processing, 104-107, 2009 | 14 | 2009 |
Embedded systems programming GA Francia III Journal of Computing Sciences in Colleges 17 (2), 217-223, 2001 | 14 | 2001 |
Performance evaluation of Modbus TCP in normal operation and under a distributed denial of service attack E Gamess, B Smith, G Francia III | 13 | 2020 |
Wireless vulnerability of SCADA systems G Francia III, D Thornton, T Brookshire Proceedings of the 50th Annual Southeast Regional Conference, 331-332, 2012 | 13 | 2012 |
Assessing competencies using scenario-based learning in cybersecurity T Ghosh, G Francia III Journal of Cybersecurity and Privacy 1 (4), 539-552, 2021 | 11 | 2021 |
Applied machine learning to vehicle security GA Francia, E El-Sheikh Machine intelligence and big data analytics for cybersecurity applications …, 2021 | 11 | 2021 |
Towards an in-depth understanding of deep packet inspection using a suite of industrial control systems protocol packets GA Francia III, XP Francia, AM Pruitt Journal of Cybersecurity Education, Research and Practice 2016 (2), 2, 2016 | 11 | 2016 |
Gamification of information security awareness training G Francia III, D Thornton, M Trifas, T Bowden Emerging trends in ICT security, 85-97, 2014 | 11 | 2014 |
Cyberattacks on SCADA systems G Francia III, D Thornton, T Brookshire Proc. 16th Colloquium Inf. Syst. Security Educ, 9-14, 2012 | 11 | 2012 |
An Empirical Study on the Performance of Java/. Net Cryptographic APIs GA Francia III, RR Francia Information Systems Security 16 (6), 344-354, 2007 | 11 | 2007 |
Visualization and management of digital forensics data G Francia, M Trifas, D Brown, R Francia, C Scott Proceedings of the 3rd annual conference on Information security curriculum …, 2006 | 11 | 2006 |