About this Collection
The publications archived in this Georgia Southern Commons collection are produced by the faculty of the Department of Information Technology.
Faculty Research in Georgia Southern Commons
Georgia Southern University faculty members are eligible to showcase their research in GS Commons and to join the Expert Gallery hosted by the University Libraries. Their intellectual and creative works are accessible through galleries organized by College, Department, Research Center, and a customized SelectedWorks researcher profile.
We invite and encourage Georgia Southern faculty members to sign up to Join the Expert Gallery!
Publishing Information
GS Commons is an open-access digital repository. Copyright and licensing agreements for works published by GS Commons protect the author's rights while facilitating the sharing of research. The works in this gallery were originally published or presented under agreements with entities external to this repository. Records for each work provide the access permitted by the original copyright and licensing agreement. For additional access or questions about a work, please contact the authors or email the GS Commons team.
Submissions from 2023
Big Cyber Security Data Analysis with Apache Mahou, Omotola Adekanbmi, Hayden Wimmer, and Jongyeop Kim
Integration of EEG and Eye Tracking Technology: A Systematic Review, Suhaima Jamal, Meenalosini Vimal Cruz, Sibi Chakravarthy, Camden Wahl, and Hayden Wimmer
Performance Analysis of Machine Learning Algorithm on Cloud Platforms: AWS vs Azure vs GCP, Suhaima Jamal and Hayden Wimmer
JavaScript Frameworks -A Comparative Study, Qozeem Odeniran and Hayden Wimmer
Big Data Approach For IoT Botnet Traffic Detection Using Apache Spark Technology, Arokodare Oluwatomisin, Hayden Wimmer, and Jie Du
An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets, Carl Rebman, Queen Booker, Hayden Wimmer, Steven Levkoff, Mark McMurtrey, and Loreen Marie Powell
An Exploratory Study Comparing Zoom and Google Technology As A Group Decision Support System, Carl M. Rebman Jr and Hayden Wimmer
Faculty Opinions on Student Preparation, Performance, And Evaluations Post Covid, Carl M. Rebman Jr, Hayden Wimmer, Queen Booker, J. Breese, P. Rogers, Mark McMurtrey, and Steven Levkoff
Web Service Credibility Evaluation Methods in Different Application Domains, Atef Shalan, Jaciel E. Reyes, Hayden Wimmer, Sarika Jain, and Mohamed Hefny
Anomaly Detection in Intrusion Detection System using Amazon SageMaker, Ian A. Trawinski, Hayden Wimmer, and Jongyeop Kim
Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and Siege, Daniel Ukene, Hayden Wimmer, and Jongyeop Kim
Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems, Hayden Wimmer, Jie Due, and Peter Heri
Submissions from 2022
Dark Web Forensics: An Investigation of Tracking Dark Web Activity with Digital Forensics, Robert Brinson, Hayden Wimmer, and Lei Chen
Botnet Intrusion Detection: a Modern Architecture to Defend a Virtual Private Cloud, Robert Brinson, Hayden Wimmer, and Carl Rebman
Predicting Customer Loyalty in the Mobile Banking Setting: An Integrated Approach, Nhuong Bui, Zach Moore, Hayden Wimmer, and Long Pham
Exploring Blockchain Performance with CPUHEAVY Microbenchmark on Smart Contracts, Beloved Egbedion, Hayden Wimmer, and Carl M. Rebman Jr
Arbitrage Behavior amongst Multiple Cryptocurrency Exchange Markets, Samuel Grone, Weitian Tong, Hayden Wimmer, and Yao Xu
Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnet, Seongsoo Kim, Hayden Wimmer, and Jongyeop Kim
Auto-ML Cyber Security Data Analysis Using Google, Azure and IBM Cloud Platforms, Emmanuel C. Opara, Hayden Wimmer, and Carl M. Rebman Jr
Deep Learning: An Empirical Study on Kimia Path24, Shaikh Shiam Rahman, Hayden Wimmer, and Loreen Marie Powell
Sentiment Based LSTM for Stock Price Prediction: Congress vs General Public, Ian A. Trawinski, Hayden Wimmer, and DeJarvis Oliver
Submissions from 2021
An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Powell, and Carl M. Rebman Jr
Security Analysis of the Amazon Echo Dot, Robert Brinson, Hayden Wimmer, and Queen Booker
Examining Sigmoid vs ReLu Activation Functions in Deep Learning, Mohammad Anwarul Islam, Hayden Wimmer, and Carl M. Rebman Jr
A Cryptocurrency Prediction Model Using LSTM and GRU Algorithms, Jongyeop Kim, Seongsoo Kim, Hayden Wimmer, and Hong Liu
A Streaming Data Collection and Analysis for Cryptocurrency Price Prediction using LSTM, Jongyeop Kim, Hayden Wimmer, Hong Liu, and Seongsoo Kim
Investigating Bluetooth Vulnerabilities to Defend from Attacks, Patel Nishitkumar, Hayden Wimmer, and Carl M. Rebman Jr
Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution, Nishitkumar Patel, Hayden Wimmer, and Loreen Powell
Awareness of Blockchain Usage, Structure, & Generation of Platform’s Energy Consumption: Working Towards a Greener Blockchain, Loreen Marie Powell, Michalina Hendon, Andrew Mangle, and Hayden Wimmer
Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl M. Rebman Jr, Gwen White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker
Disruption and Protection of Online Synchronous Learning Environments via 802.11 Manipulation, Matthew Tigner and Hayden Wimmer
Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.
Windows Reverse TCP Attack: The Threat of Out-of-Date Machinery, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.
Deep Learning on Cryptocurrency - Challenges Processing GPU and CPU Architectures, Ian A. Trawinski, Hayden Wimmer, and Weitian Tong
Submissions from 2020
An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer
A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert
Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim
Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman
Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan
An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman
Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr
PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim
Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad
PHPBB3 Bulletin Board Security Testing, Nishitkumar Patel, Hayden Wimmer, and Loreen Marie Powell
Improving the Predictive Performance of the c4.5 Decision Tree Algorithm for Categorical Medical Data, Shaikh Shiam Rahman, Hayden Wimmer, and Carl Rebman
Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl Rebman, Gwendolyn White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware, Hossain Shahriar, Kai Qian, Atef Shalan, and Fan Wu
Barriers and Drivers to Adoption of Cloud Infrastructure Services: A Security, Michael Towsend, Hayden Wimmer, and Jei Du
Submissions from 2019
Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Powell
Cyber-Security Instructional Technology Design, Billy Carrie, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
Hour of Code: A Study of Gender Differences in Computing, Jei Du and Hayden Wimmer
Impact of Hour of Code: A Five Year Study, Jei Du and Hayden Wimmer
Examining a Deep Learning Network System for Image Identification and Classification for Preventing Unauthorized Access for a Smart Home Security System, Beloved Egbedion, Hayden Wimmer, Carl Rebman, and Loreen Marie Powell
An Exploratory Study on Variances in Perceptions of Smart Home Technologies, Thomas Mendoza, Hayden Wimmer, and Carl Rebman
Learner Security & Privacy Risks: How Usage of Online Social Media Outside a Learning Management Systems Affects Learners’ Digital Identity, Loreen Powell, Hayden Wimmer, Carl Rebman, and Chaza Abdul al
Knowledge Portals: A Review, Hayden Wimmer, Jie Du, and Roy Rada
Submissions from 2018
Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Marie Powell
Using Geodesic Acceleration with LevMar to Maximize Smart Home Energy Management, Queen E. Booker, Fred L. Kitchens, Hayden Wimmer, and Carl Rebman
Using Ann with Geodesic Acceleration to Maximize Smart Energy Management, Queen E. Booker, Carl Rebman, Hayden Wimmer, and Fred L. Kitchens
Electronic Emergency Medical Technician Reports –Testing A Perception Of A Prototype, Smiljana Cuk, Hayden Wimmer, and Loreen Powell
Exposing The Tor Failures On Mobile Devices Using Paraben’s E3:Ds Technology, Ton H. Don, Hayden Wimmer, Lei Chen, and Queen E. Booker
Diving Into the Darknet: Using Tableau to Shed Some Light On Data Analysis, Ton H. Don, Hayden Wimmer, C. Rebmann, and S. Scheidt
Hour of Code: A Case Study, Jie Du, Hayden Wimmer, and Roy Rada
Building an Application for Custom Mobile Medication Reminders In Healthcare: An Exploratory Study, Beloved Egbedion, Hayden Wimmer, Carl M. Rebman Jr, and Loreen Marie Powell
Skill Requirements in Big Data: A Content Analysis of Job Advertisements, Adrian Gardiner, Cheryl L. Aasheim, Paige Rutner, and Susan Rebstock Williams
Twitter Sentiment Toward Autism During Autism Awareness Month, Jeffrey P. Kaleta, Jingjing Yin, and Sushmita Khan
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP, Olajide Ojagbule, Hayden Wimmer, and Rami Haddad
Trends in Gerotechnology: A Literature Review, Roy Rada, Jie Du, and Hayden Wimmer
Analyzing Data from an Android Smartphone while Comparing between Two Forensic Tools, Majeed Kayode Raji, Hayden Wimmer, and Rami Haddad
A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations, Carl Rebman, Hayden Wimmer, and Queen Booker
A Digital Forensic Tool for Mobile Devices: Paraben, Hitesh Sachdev, Hayden Wimmer, and Lei Chen
A New Framework for Securing, Extracting and Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, and Carl Rebman
Quantum chemical spectral characterization of CH2NH2+ for remote sensing of Titan’s atmosphere, Russell Thackston and Ryan C. Fortenberry
Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS, Gwen White, Hayden Wimmer, Carl Rebman, and Chrisitan Sunday Nwankwo
Ontologies and the Semantic Web for Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, and Tom Narock
Applying Artificial Intelligence to Financial Investing, Hayden Wimmer and Roy Rada
Submissions from 2017
Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, and Kai Wang
Framework and Challenges: H.265/HEVC Rate Control in Real-Time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, and Danda Rawat
Problems Associated with Patient Care Reports and Transferring Data between Ambulance and Hospitals from the Perspective of Emergency Medical Technicians, Smiljana Cuk, Hayden Wimmer, and Loreen Marie Powell
A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac J. Cushman, Md Baitul Al Sadi, Lei Chen, and Rami Haddad
Cooperative Adaptive Cruise Control of Connected and Autonomous Vehicles Subject to Input Saturation, Weinan Gao, Fernando Rios-Gutierrez, Weitian Tong, and Lei Chen
Emotional Intelligence and Communication Levels in Information Technology Professionals, Michalina Hendon, Loreen Powell, and Hayden Wimmer
Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, and Biswanath Samanta
Email Phishing Susceptibility in a Public School Setting: Identifying at Risk Educators, M. Horton and Hayden Wimmer
Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity, Sushmita Khan, Hayden Wimmer, and Loreen Marie Powell
Consumer Perceptions about E-Commerce – The Influence of Public Internet Trust, Lakshman Mahadevan and Jeffrey P. Kaleta
Linked Data Scientometrics in Semantic E-Science, Tom Narock and Hayden Wimmer
Predicting Movie Ratings using Sentiment Analysis of Tweets, Christian Nwankwo, Hayden Wimmer, and Jie Du
The Need for an Emotional Intelligence for Information Technology Course: Framework for Educators and Academic Institutions, Loreen Marie Powell, Michalina Hendon, and Hayden Wimmer
Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach, Loreen Marie Powell and Hayden Wimmer
Impact of Online Discussions on Web Based Assessments, Loreen Marie Powell, Hayden Wimmer, Lawrence Kilgus, and Christina M. Force
Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina Force, and Lawrence Kilgus
Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina M. Force, and Lawrence C. Kilgus
Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi
Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi
Decision Trees and Financial Variables, Roy Rada and Hayden Wimmer