About this Collection

The publications archived in this Digital Commons@Georgia Southern collection are produced by the faculty of the Department of Information Technology.

Faculty Research in Digital Commons@Georgia Southern

Georgia Southern University faculty members are eligible to showcase their research in Digital Commons@Georgia Southern and to join the Expert Gallery hosted by the University Libraries. Their intellectual and creative works are accessible through galleries organized by College, Department, Research Center, and a customized SelectedWorks researcher profile.

We invite and encourage Georgia Southern faculty members to sign up to Join the Expert Gallery!

Publishing Information

Digital Commons@Georgia Southern is an open-access digital repository. Copyright and licensing agreements for works published by Digital Commons@Georgia Southern protect the author's rights while facilitating the sharing of research. The works in this gallery were originally published or presented under agreements with entities external to this repository. Records for each work provide the access permitted by the original copyright and licensing agreement. For additional access or questions about a work, please contact the authors or email the Digital Commons team.

Additional Instructions for Screen Reader Users

The Readership Activity Map feature further down the page presents a real time interactive world map with pins indicating where documents from our collection have been downloaded recently. Begin reading after the Zoom buttons to find additional real time statistics.

Follow


Submissions from 2023

Link

Big Cyber Security Data Analysis with Apache Mahou, Omotola Adekanbmi, Hayden Wimmer, and Jongyeop Kim

Link

Integration of EEG and Eye Tracking Technology: A Systematic Review, Suhaima Jamal, Meenalosini Vimal Cruz, Sibi Chakravarthy, Camden Wahl, and Hayden Wimmer

Link

Performance Analysis of Machine Learning Algorithm on Cloud Platforms: AWS vs Azure vs GCP, Suhaima Jamal and Hayden Wimmer

JavaScript Frameworks -A Comparative Study, Qozeem Odeniran and Hayden Wimmer

Link

Big Data Approach For IoT Botnet Traffic Detection Using Apache Spark Technology, Arokodare Oluwatomisin, Hayden Wimmer, and Jie Du

Link

An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets, Carl Rebman, Queen Booker, Hayden Wimmer, Steven Levkoff, Mark McMurtrey, and Loreen Marie Powell

An Exploratory Study Comparing Zoom and Google Technology As A Group Decision Support System, Carl M. Rebman Jr and Hayden Wimmer

Faculty Opinions on Student Preparation, Performance, And Evaluations Post Covid, Carl M. Rebman Jr, Hayden Wimmer, Queen Booker, J. Breese, P. Rogers, Mark McMurtrey, and Steven Levkoff

Link

Web Service Credibility Evaluation Methods in Different Application Domains, Atef Shalan, Jaciel E. Reyes, Hayden Wimmer, Sarika Jain, and Mohamed Hefny

Anomaly Detection in Intrusion Detection System using Amazon SageMaker, Ian A. Trawinski, Hayden Wimmer, and Jongyeop Kim

Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and Siege, Daniel Ukene, Hayden Wimmer, and Jongyeop Kim

Link

Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems, Hayden Wimmer, Jie Due, and Peter Heri

Submissions from 2022

Link

Dark Web Forensics: An Investigation of Tracking Dark Web Activity with Digital Forensics, Robert Brinson, Hayden Wimmer, and Lei Chen

Link

Botnet Intrusion Detection: a Modern Architecture to Defend a Virtual Private Cloud, Robert Brinson, Hayden Wimmer, and Carl Rebman

PDF

Predicting Customer Loyalty in the Mobile Banking Setting: An Integrated Approach, Nhuong Bui, Zach Moore, Hayden Wimmer, and Long Pham

Link

Exploring Blockchain Performance with CPUHEAVY Microbenchmark on Smart Contracts, Beloved Egbedion, Hayden Wimmer, and Carl M. Rebman Jr

Link

Arbitrage Behavior amongst Multiple Cryptocurrency Exchange Markets, Samuel Grone, Weitian Tong, Hayden Wimmer, and Yao Xu

Link

Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnet, Seongsoo Kim, Hayden Wimmer, and Jongyeop Kim

Link

Auto-ML Cyber Security Data Analysis Using Google, Azure and IBM Cloud Platforms, Emmanuel C. Opara, Hayden Wimmer, and Carl M. Rebman Jr

Link

Deep Learning: An Empirical Study on Kimia Path24, Shaikh Shiam Rahman, Hayden Wimmer, and Loreen Marie Powell

Link

Sentiment Based LSTM for Stock Price Prediction: Congress vs General Public, Ian A. Trawinski, Hayden Wimmer, and DeJarvis Oliver

Submissions from 2021

Link

An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Powell, and Carl M. Rebman Jr

Link

Security Analysis of the Amazon Echo Dot, Robert Brinson, Hayden Wimmer, and Queen Booker

Link

Examining Sigmoid vs ReLu Activation Functions in Deep Learning, Mohammad Anwarul Islam, Hayden Wimmer, and Carl M. Rebman Jr

Link

A Cryptocurrency Prediction Model Using LSTM and GRU Algorithms, Jongyeop Kim, Seongsoo Kim, Hayden Wimmer, and Hong Liu

Link

A Streaming Data Collection and Analysis for Cryptocurrency Price Prediction using LSTM, Jongyeop Kim, Hayden Wimmer, Hong Liu, and Seongsoo Kim

Link

Investigating Bluetooth Vulnerabilities to Defend from Attacks, Patel Nishitkumar, Hayden Wimmer, and Carl M. Rebman Jr

Link

Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution, Nishitkumar Patel, Hayden Wimmer, and Loreen Powell

PDF

Awareness of Blockchain Usage, Structure, & Generation of Platform’s Energy Consumption: Working Towards a Greener Blockchain, Loreen Marie Powell, Michalina Hendon, Andrew Mangle, and Hayden Wimmer

Link

Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl M. Rebman Jr, Gwen White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker

Link

Disruption and Protection of Online Synchronous Learning Environments via 802.11 Manipulation, Matthew Tigner and Hayden Wimmer

Link

Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.

Link

Windows Reverse TCP Attack: The Threat of Out-of-Date Machinery, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.

Link

Deep Learning on Cryptocurrency - Challenges Processing GPU and CPU Architectures, Ian A. Trawinski, Hayden Wimmer, and Weitian Tong

Submissions from 2020

Link

An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman

Link

A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer

Link

A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert

Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim

Link

Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman

Link

Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan

Link

An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman

Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr

Link

PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad

Link

Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell

Link

Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell

Link

Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim

Link

Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad

Link

PHPBB3 Bulletin Board Security Testing, Nishitkumar Patel, Hayden Wimmer, and Loreen Marie Powell

Improving the Predictive Performance of the c4.5 Decision Tree Algorithm for Categorical Medical Data, Shaikh Shiam Rahman, Hayden Wimmer, and Carl Rebman

Link

Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl Rebman, Gwendolyn White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker

Link

Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware, Hossain Shahriar, Kai Qian, Atef Shalan, and Fan Wu

Link

Barriers and Drivers to Adoption of Cloud Infrastructure Services: A Security, Michael Towsend, Hayden Wimmer, and Jei Du

Submissions from 2019

Link

Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Powell

Link

Cyber-Security Instructional Technology Design, Billy Carrie, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman

Link

Hour of Code: A Study of Gender Differences in Computing, Jei Du and Hayden Wimmer

Link

Impact of Hour of Code: A Five Year Study, Jei Du and Hayden Wimmer

Link

Examining a Deep Learning Network System for Image Identification and Classification for Preventing Unauthorized Access for a Smart Home Security System, Beloved Egbedion, Hayden Wimmer, Carl Rebman, and Loreen Marie Powell

An Exploratory Study on Variances in Perceptions of Smart Home Technologies, Thomas Mendoza, Hayden Wimmer, and Carl Rebman

Link

Learner Security & Privacy Risks: How Usage of Online Social Media Outside a Learning Management Systems Affects Learners’ Digital Identity, Loreen Powell, Hayden Wimmer, Carl Rebman, and Chaza Abdul al

Link

Knowledge Portals: A Review, Hayden Wimmer, Jie Du, and Roy Rada

Submissions from 2018

Link

Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Marie Powell

Link

Using Geodesic Acceleration with LevMar to Maximize Smart Home Energy Management, Queen E. Booker, Fred L. Kitchens, Hayden Wimmer, and Carl Rebman

Link

Using Ann with Geodesic Acceleration to Maximize Smart Energy Management, Queen E. Booker, Carl Rebman, Hayden Wimmer, and Fred L. Kitchens

Link

Electronic Emergency Medical Technician Reports –Testing A Perception Of A Prototype, Smiljana Cuk, Hayden Wimmer, and Loreen Powell

Link

Exposing The Tor Failures On Mobile Devices Using Paraben’s E3:Ds Technology, Ton H. Don, Hayden Wimmer, Lei Chen, and Queen E. Booker

Link

Diving Into the Darknet: Using Tableau to Shed Some Light On Data Analysis, Ton H. Don, Hayden Wimmer, C. Rebmann, and S. Scheidt

Link

Hour of Code: A Case Study, Jie Du, Hayden Wimmer, and Roy Rada

Link

Building an Application for Custom Mobile Medication Reminders In Healthcare: An Exploratory Study, Beloved Egbedion, Hayden Wimmer, Carl M. Rebman Jr, and Loreen Marie Powell

Link

Skill Requirements in Big Data: A Content Analysis of Job Advertisements, Adrian Gardiner, Cheryl L. Aasheim, Paige Rutner, and Susan Rebstock Williams

Link

Twitter Sentiment Toward Autism During Autism Awareness Month, Jeffrey P. Kaleta, Jingjing Yin, and Sushmita Khan

Link

Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP, Olajide Ojagbule, Hayden Wimmer, and Rami Haddad

Link

Trends in Gerotechnology: A Literature Review, Roy Rada, Jie Du, and Hayden Wimmer

Link

Analyzing Data from an Android Smartphone while Comparing between Two Forensic Tools, Majeed Kayode Raji, Hayden Wimmer, and Rami Haddad

Link

A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations, Carl Rebman, Hayden Wimmer, and Queen Booker

Link

A Digital Forensic Tool for Mobile Devices: Paraben, Hitesh Sachdev, Hayden Wimmer, and Lei Chen

PDF

A New Framework for Securing, Extracting and Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, and Carl Rebman

Link

Quantum chemical spectral characterization of CH2NH2+ for remote sensing of Titan’s atmosphere, Russell Thackston and Ryan C. Fortenberry

Link

Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS, Gwen White, Hayden Wimmer, Carl Rebman, and Chrisitan Sunday Nwankwo

PDF

Ontologies and the Semantic Web for Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, and Tom Narock

Link

Applying Artificial Intelligence to Financial Investing, Hayden Wimmer and Roy Rada

Submissions from 2017

Link

Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, and Kai Wang

Link

Framework and Challenges: H.265/HEVC Rate Control in Real-Time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, and Danda Rawat

Link

Problems Associated with Patient Care Reports and Transferring Data between Ambulance and Hospitals from the Perspective of Emergency Medical Technicians, Smiljana Cuk, Hayden Wimmer, and Loreen Marie Powell

Link

A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac J. Cushman, Md Baitul Al Sadi, Lei Chen, and Rami Haddad

Link

Cooperative Adaptive Cruise Control of Connected and Autonomous Vehicles Subject to Input Saturation, Weinan Gao, Fernando Rios-Gutierrez, Weitian Tong, and Lei Chen

Link

Emotional Intelligence and Communication Levels in Information Technology Professionals, Michalina Hendon, Loreen Powell, and Hayden Wimmer

Link

Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, and Biswanath Samanta

Link

Email Phishing Susceptibility in a Public School Setting: Identifying at Risk Educators, M. Horton and Hayden Wimmer

Link

Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity, Sushmita Khan, Hayden Wimmer, and Loreen Marie Powell

Link

Consumer Perceptions about E-Commerce – The Influence of Public Internet Trust, Lakshman Mahadevan and Jeffrey P. Kaleta

Link

Linked Data Scientometrics in Semantic E-Science, Tom Narock and Hayden Wimmer

Link

Predicting Movie Ratings using Sentiment Analysis of Tweets, Christian Nwankwo, Hayden Wimmer, and Jie Du

Link

The Need for an Emotional Intelligence for Information Technology Course: Framework for Educators and Academic Institutions, Loreen Marie Powell, Michalina Hendon, and Hayden Wimmer

Link

Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach, Loreen Marie Powell and Hayden Wimmer

Link

Impact of Online Discussions on Web Based Assessments, Loreen Marie Powell, Hayden Wimmer, Lawrence Kilgus, and Christina M. Force

Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina Force, and Lawrence Kilgus

Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina M. Force, and Lawrence C. Kilgus

Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi

Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi

Link

Decision Trees and Financial Variables, Roy Rada and Hayden Wimmer