Fitzroy Nembhard

Fitzroy Nembhard
Florida Institute of Technology · Department of Computer Science

Ph.D.

About

14
Publications
1,888
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
25
Citations
Introduction
An IEEE Senior Member, Fitzroy Nembhard received a PhD in Computer Science from Florida Institute of Technology under advisor Dr. Marco Carvalho. He also holds a M.Sc in Bioinformatics from Morgan State University in Baltimore, MD. Fitzroy's research interests include High Performance Computing, Secure Programming (Developing tools to help programmers write secure code), Data Mining, development of Bioinformatics tools and algorithms, and Computer Graphics.

Publications

Publications (14)
Conference Paper
Full-text available
Numerous agent-oriented methodologies that offer a rich pool of resources to support developers of agent-based systems have been proposed. However, the use of existing method-ologies in industrial settings is still limited due to the large volume of methodologies, diversity of covered scopes, ambiguity in concepts, and lack of maturity. This makes...
Conference Paper
Full-text available
There has been substantial focus on software metrics over the last few decades. However, many activities within software engineering are often qualitative and are not consonant with automated approaches. Consequently, there are few tools to measure software development quality or to assess teamwork contribution. This paper uses ideas from the Goal-...
Article
Full-text available
Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowledge of secure coding standards, negligence, and poor performance of and usability issues with existing code analysis tools. Therefor...
Preprint
Full-text available
Static analysis remains one of the most popular approaches for detecting and correcting poor or vulnerable program code. It involves the examination of code listings, test results, or other documentation to identify errors, violations of development standards, or other problems, with the ultimate goal of fixing these errors so that systems and soft...
Chapter
Full-text available
The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilit...
Preprint
Full-text available
The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilit...
Chapter
Full-text available
Network motifs have been widely used in the analysis of various biological networks, including protein-protein interaction (PPI) networks, transcription regulation networks (TRNs), and metabolic networks. Counting network motif involves expensive enumeration of sub-patterns and graph isomorphism. Many protein-protein interaction data-bases are read...
Poster
Full-text available
This paper discusses a solution that deploys passive UHF RFID technology and wireless sensors on small farms to provide intelligence that will help mitigate some disparate socioeconomic conditions in farming communities. Starting with a collaborative effort with farmers in the community of Holopaw, Florida, in the United States, we first propose ex...
Poster
Full-text available
Classification of network traffic is an important problem in Cyber Security. Techniques in Data Mining and Machine Learning have been successfully applied to the classification problem. However, few benchmarks have been provided to give researchers some intuition on the performances of popular algorithms in network traffic classification. We addres...

Network

Cited By

Projects

Project (1)