TECHNICAL SKILLS (SUMMARY):
Software/Dev Environments
|
IDE: Eclipse, GWT Designer,
Netbeans, Matisse, Visual Studio/TS; Version Control: VSS, Perforce, CVS, SVN; Modeling & Simulation:
Rational Rose, UMLet, MATLAB, Magic, Spice, QEMU, Micro Cap, MAPLE V, Mathematica, Opnet, NS-2; Web: Tomcat/Apache/IIS, WebSphere, WebLogic,
WAPT; Multimedia: Flash,
Photoshop, Gigapocket, Audacity; FPGA:
Xilinx ISE, ActiveHDL
|
Languages
|
Java, Swing, J2EE,
JSP, Servlets, JavaScript, C,
C++, PHP, Microsoft: C#, MFC, Visual C++, ASP.NET, EmbedVC++, Visual Basic,
SQL, XML, XSLT, UML, Tcl/Tk, IDL,
Flex, Perl, VHDL, XVT, Vax DCL, FORTRAN, Pascal, COBOL, Assembly (MIPS,
80x86, 6502), Omnis 7, MACCSII, Accent
|
Frameworks/APIs
|
GWT, RPC, GWT-Ext,
J2EE, EoD SQL, AJAX, Struts, Hibernate, JPA, JDBC, ODBC, ADO, OLE DB, .NET, HotDraw, AspectJ, Velocity, OSGI (with JMS), JPF, JBoss, MPI,
POI, Apache Commons, Server Faces, NVIDIA CUDA, OpenNebula
|
DB, Security, Forensic
|
Enterprise DB: Oracle, Informix, MySQL,
hsqldb, MS SQL 2005, Desktop DB:
Access, Paradox; Scanning: NMAP, Nessus, Nikto; Packet: tcpdump, snoop, Wireshark; IDS: Snort, NIDS,
PHPIDS; Forensic: FTK, Paraben, TSK/Autopsy, DASH4™,
REM4™
|
OS, Specifications, Protocols, Techniques
|
Windows, Linux (many
flavors), Unix/Solaris, Embedded
PowerTV, Windows CE, Palm; Specifications
Design Patterns, Anti-Patterns, RPC, BPM, COM/DCOM/ActiveX, DOM, MPEG2, MPEG4, IPTV, QOS, VoIP,
NDIS, GPIB, Protocols: TCP/IP, Java RMI, JRMP, RTP, SDP,
RTSP, Instant messaging- intant_t, SIMPLE, XMPP; Techniques: OOP, AOP, Neural Networks, Genetic Algorithms,
BPM, Evolutionary Strategies, Monte
Carlo Methods, Game Theory, IDS/IPS, Agile SCRUM, OPC UA, OPC DA
|
M.E.E.E., Electrical Engineering, Pennsylvania State University
B.S.E., Electrical Engineering, Temple University
10/10
- Present, Consultant,
Pluraldom and Clients
(Several were held simultaneously)
|
Pluraldom
Systems, Hockessin, DE
|
● Yonsei University, Seoul, Korea (06/09 – Present),
Communications & Networking Laboratory
(Ranked #26 among Top Asian
Universities)
|
Research Professor (Part-time)
|
Participated in a number of efforts:
01/03
– 10/10, Consultant,
Shadowband and Clients
(Several were held simultaneously)
|
Shadowband
Systems, Norcross, GA
|
Conducted annual network vulnerability assessment: used a variety of tools to assess the vulnerability of the external network as a Phase 0 test (i.e. zero knowledge of internal infrastructure) incorporating guidelines from NIST, Open-Source Security Testing Methodology (OSSTM), and Payment Card Industry Data Security (PCI DSS). Tools used: Nessus, nikto, nmap, and ShadowDC.
Designed and implemented a web-based marketing list generator; walked and parsed pages for contact list creation based on search criteria. Tabbed interface included support for file upload and download with support for multiple file formats in a multi-threaded environment. Language and Tools used: Eclipse, Java, GWT, GWT Designer, GWT-Ext, hsqldb, httpunit. Client-side work involved GWT, and associated tools, server-side work involved servlets and GWT-RPC.
SBIR Phase I work involved applying self-similarity metrics to security. NS-2, C++, and Matlab were used to test hypothesis involving characteristics such as Hurst parameters, wavelet estimation, and power spectrum; an ARMA model was created to remove data set irregularity.
Lead architect and implementer of 5 to 10 consultant teams for several projects:
09/01 - 02/03, Consultant,
|
Scientific Atlanta, Lawrenceville, GA
|
|||
Technical lead in the
development and implementation of a multi-threaded navigational framework, SA’s C++, OO based set-top
resident application, and multi-tuner DVR (digital video recorder). This
effort represents a paradigm shift to an object-oriented environment. This
includes a coded migration path from legacy code, sufficient breadth for feature
enhancements via support for multiple design patterns, and plug-and-play-able
layering with respect to switching operating systems. Multiple hardware platforms with cross-over
compilation were integral to the project.
|
||||
|
Scientific Atlanta, Lawrenceville, GA
|
|||
Lead, designed, and implemented
a thread-safe object-oriented component library used by application
developers and served as the set-top GUI
underpinnings for Buzztime Entertainment, Inc. This
C++ library has several features that present a consistent and versatile approach
to developing applications that require GUI components for interactive
television applications. Media-based efforts include jpg conversion for
graphical animation. The library was
suitable for multiple hardware platforms and extensively interacted with
video memory and window management.
|
||||
05/00 - 04/01,
Consultant,
|
PowerTV/Scientific Atlanta, Cupertino, CA
|
|||
Projects included: Technical
lead of 10 person team hired to enhance, port, and stabilize a multi-threaded
C/C++ HTML engine; developed a JavaScript lexer-scanner
used to search for unsupported language features involving pre-AJAX efforts
involving the DOM and CSS; background work on MPEG-2 transport streams for
data carousel creation; porting code to meet Suns JavaTV
specification as part of an effort to meet the DVB-MHP standard.
|
||||
09/00
- 02/01, Research Engineer,
|
GTRI,
Atlanta, GA
|
||||||||
Private
and public-sector contract development; conducted research on security topics
including soft-computing approaches to anomaly/intrusion detection, data
correlation to reduce false positives, and wireless work on Mobile IP using
Matlab, C++, and Java. Techniques
involving LVQ (learning vector quantization), SOMs (self-organizing maps),
and radial basis functions.
|
|||||||||
10/97
- 05/00, Research Assistant,
|
Georgia
Institute of Technology
|
||||||||
Participated in several projects
in several different areas:
● 06/99 - 05/00 GTISC (Georgia Tech
Information Security Center) funded research related to the development of
intelligent tools C++ and Java to analyze real-time network traffic data for
detection of malicious activity; methods included characterizing port usage,
source IP, Date/Time, etc. This work
also included analysis of denial of service, covert applet channels, buffer
overflows in Java security assessments; RSA encryption strength via primality
testing (including Solovay-Strassen and Lehmann algorithms).
● 06/98 - 06/99
NSF-funded Computer Enhanced Education project, developed software in Java,
Matlab and C++ to facilitate the learning of classical control theory.
In particular, the tool allows iterative proportional integrator (PI/lag) and
proportional differential (PD/lead) design directly on a root-locus plot as
well as a Bode plot (magnitude and phase).
● 10/97 - 06/98 Efforts included
research on dielectric heating and the design of a radio-wave heater for a
Department of Agriculture sponsored project using C++ and Matlab
|
|||||||||
07/95
- 02/97, Academic
Computing Fellow,
|
The
Pennsylvania State University
|
||||||||
Research
related to applying intelligent tools to optimization problems as well as
electrostatic boundary value problems.
In particular, evolutionary strategies to solve Laplace’s and
Poisson’s equation, neural networks (various multi-layered perceptrons with
Levenberg-Marquardt training), hybrid interpolative systems involving neural
networks with Markov chains were designed.
Innovations include a new variation of a floating random walk.
|
|||||||||
|
|||||||||
|
|||||||||
Serviced
clients in the chemical, manufacturing and pharmaceutical industries (Namely,
Johnson and Johnson Inc. and Arco Chemical Co.). Coded in C, C++, MACCSII,
and Omnis 7. Developed applications generally
d of a graphical
front-end with a database back-end. Client needs included prototyping a
compound registration system for chemists, assisting in the development of a
material data sheet system, and automated file handling routines used in a
customized barcode inventory system.
Coding effort involved chemist compound registrations.
|
|||||||||
|
|||||||||
08/93
- 06/94, SOFTWARE ENGINEER,
|
Numar
Corp., Malvern, PA
|
||||||||
Designed and
coded software in C++ for a petroleum searching system using Nuclear Magnetic Resonance Imaging. Development effort consisted
of approximately 70,000 lines of multi-threaded, object-oriented code. Coded mathematical algorithms to compute porosity, diffusion, and
formation relaxation times. Code existed as both a server-side monitor and an
embedded magnet communication driver.
|
|||||||||
Awards:
|
● 2007 Administrator’s Award of Excellence (June 2007): Award
given by the Small Business Administration in recognition of outstanding
service as a vendor to the Department of Defense.
|
● SBIR Phase I Award ($100K): National Science Foundation: Self-similarity Metrics in
Intrusion Detection
|
● SBIR Phase I Award ($100K):
United States Air Force:: Multi-layered Protocol Security
|
● SBIR Phase II Award ($750K): United
States Air Force: Multi-layered Protocol Security
|
● SBIR Phase IIa Award ($70K): United
States Air Force: Multi-layered Protocol Security
|
● Georgia Institute of Technology Tower Award (2001) Award given in recognition of academic
excellence
|
● GTISC (Georgia Tech Information Security Center): Research Award
(June 1999): $30,000 award to conduct security research as well as produce
tools that can be used to facilitate the learning of security.
|
● The Pennsylvania State University Academic Computing Fellowship
(1995-96): $30,000/year renewed annually for two years. Tuition,
monthly stipend, and yearly allowance to attend conferences and purchase
equipment; first electrical engineering graduate school major to win such an
award.
|
● Eta
Kappa Nu
Honor Society Best Paper Award (1996): Penn State Chapter competition.
|
Memberships: Eta Kappa Nu, IEEE, ACM
|
PATENTS:
Publications:
Journal/Magazine:
1.
|
M. N. O. Sadiku, C. M. Akujuobi,
R. C. Garcia, An Introduction to
Wavelets in Electromagnetics, IEEE Microwave Magazine, pp. 63-72, June 2005.
|
2.
|
J. Cannady and R. C. Garcia.
The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks,
Lecture Notes in Computer Science: 2001 International Conference on
Artificial Neural Networks. Springer:Heidelberg, GE
|
3.
|
R.
C. Garcia and B. S. Heck,
Enhancing Classical Controls Education via Interactive GUI Design, IEEE Control Systems Magazine, vol.
19, no. 3, pp. 77-82, June 1999.
|
4.
|
R.
C. Garcia and M. N. O.
Sadiku, Neuro-Monte Carlo Solution of Electrostatic
Problems, Journal of the Franklin
Institute, vol. 335B, no. 1, pp. 53-69, 1998.
|
5.
|
M.N.O. Sadiku and R.C. Garcia, Whole Field Computation using Monte Carlo Method, International Journal of Numerical
Modeling: Electronic Networks, Devices and Fields, vol. 10, pp. 303-312,
1997.
|
1.
|
Appendix B: Solving Electromagnetic Problems Using C++, M. N. O. Sadiku, Numerical Techniques in Electromagnetics, 2nd Ed., New York, NY: CRC
Press, 2000.
|
2.
|
Appendix C:
Numerical Techniques Using C++, M.
N. O. Sadiku, Numerical Techniques in Electromagnetics,
2nd Ed., New York, NY: CRC Press, 2000.
|
1.
|
R.
C. Garcia (Invited Paper)
Network Security: Mapping Intrusion and Anomaly Detection to Very-High-Degree
Polynomials, Asilomar Conference on Signals,
Systems, and Computers, Pacific Grove, California, Nov. 7-10, 2004.
|
2.
|
J.-M.
Chung, S. Panguluru,
D. Liu, and R. C. Garcia, (Invited Paper) "Multiple LSP Routing Network
Security for MPLS Networking," Proc. of IEEE MWSCAS 2002, Tulsa,
Oklahoma, Aug. 4-7, 2002.
|
1.
|
R. C. Garcia, J. Cannady, and M.N.O. Sadiku, WAID:
Wavelet Analysis Intrusion Detection, Proc. IEEE MWSCAS02, Aug. 2002.
|
2.
|
R.
C. Garcia and J. D. Cannady, Boundary Expansion of Expert Systems:
Incorporating Evolutionary Computation with Intrusion Detection Solutions, in
Proceedings of IEEE SoutheastCon 2001, Clemson,
South Carolina, March 2001.
|
3.
|
Dennis C. Bauer, J. D. Cannady,
and R. C. Garcia, Detecting
Anomalous Behavior: Optimization of Network Traffic Parameters via an
Evolutionary Strategy, in Proceedings of IEEE SoutheastCon
2001, Clemson, South Carolina, March 2001.
|
4.
|
R.
C. Garcia, M. N. O. Sadiku
and K. Gu, Applying Absorbing Markov Chains to
Solve Poissons Equation in Inhomogeneous Regions, in Proceedings of IEEE SoutheastCon 2001, Clemson, South Carolina, March 2001.
|
5.
|
J. A. Copeland and R. C. Garcia, Real-Time Anomaly Detection Using Soft-Computing
Techniques, in Proc. of IEEE SoutheastCon 2001,
Clemson, South Carolina, March 2001.
|
6.
|
B. S. Heck, S. E. Poindexter, and R. C. Garcia, Integrating the Web into traditional teaching
methods, in Proceedings of 2000 American Controls Conference,
Chicago, IL, June 2000.
|
7.
|
R.
C. Garcia and J. A. Copeland,
Soft Computing Tools to Detect and Characterize Anomalous Network Behavior,
in Proceedings of IEEE SoutheastCon 2000, pp.
475-478, Nashville, Tennessee, April 2000.
|
8.
|
R.
C. Garcia, R. J. LeBlanc, and
M. N. O. Sadiku, JavaMonte: A New Programming
Language for Monte Carlo Simulation, in Proceedings of IEEE SoutheastCon 2000, pp. 305-308, Nashville, Tennessee,
April 2000.
|
9.
|
M. N. O. Sadiku and R. C. Garcia, The Method of Lines Solution of Axisymmetric
Problems, in Proceedings of IEEE SoutheastCon 2000,
pp. 527-530, Nashville, Tennessee, April 2000.
|
10.
|
R.
C. Garcia and B. S. Heck,
Enhancing Engineering Education on the Web: The Use of ActiveX Controls and
Automation Server Technology, in Proceedings of IEEE SoutheastCon
2000, pp. 515-518, Nashville, Tennessee, April 2000.
|
11.
|
R.
C. Garcia and B. S. Heck, An
Interactive Tool for Classical Control Design Education, in Proceedings 1999
American Controls Conference, pp. 1460-1464, San Diego, California, June
1999.
|
12.
|
R.
C. Garcia and M. N. O.
Sadiku, Two-Part Solution of Laplaces Equation: An
Adaptive Fuzzy System Front-End with a Markov Chain Back-End, in Proceedings
IEEE SoutheastCon 1998, pp. 281-282, Orlando,
Florida, April 1998.
|
13.
|
R.
C. Garcia and M. N. O.
Sadiku, Using Evolutionary Strategies to Solve Laplaces
Equation, in Symposium Digest, 15th Benjamin Franklin Symposium, pp. 18-21,
Philadelphia, Pennsylvania, May 1997.
|
14.
|
R.
C. Garcia and M. N. O.
Sadiku, Neural Network Solution of Poissons Equation with a Floating Random
Walk Back-End, in Symposium Digest, 14th Benjamin Franklin Symposium, pp.
68-71, Philadelphia, Pennsylvania, May 1996.
|
15.
|
R.
C. Garcia and M. N. O.
Sadiku, Neural Network Solution of Laplaces
Equation with a Markov Chain Back-End, in Symposium Digest, 14th Benjamin
Franklin Symposium, pp. 3-6, Philadelphia, Pennsylvania, May 1996.
|
16.
|
R.
C. Garcia and M. N. O.
Sadiku, Monte Carlo Fixed-Radius Floating Random Walk Solution For Potential
Problems, in Proceedings of IEEE SoutheastCon 1996,
pp. 92-95, Tampa, Florida, April 1996.
|
17.
|
M. N. O. Sadiku and R. C. Garcia, Monte Carlo Floating Random Walk Solution of
Poissons Equation in Proceedings of IEEE SoutheastCon
1993, Charlotte, NC, April 1993.
|
Download Resume Format
0 comments:
Post a Comment