Additional Instructions for Screen Reader Users
The Readership Activity Map feature further down the page presents a real time interactive world map with pins indicating where documents from our collection have been downloaded recently. Begin reading after the Zoom buttons to find additional real time statistics.
Submissions from 2021
Awareness of Blockchain Usage, Structure, & Generation of Platform’s Energy Consumption: Working Towards a Greener Blockchain, Loreen Marie Powell, Michalina Hendon, Andrew Mangle, and Hayden Wimmer
Disruption and Protection of Online Synchronous Learning Environments via 802.11 Manipulation, Matthew Tigner and Hayden Wimmer
Submissions from 2020
An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer
A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert
Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim
Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman
Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan
An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman
Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr
PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim
Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad
PHPBB3 Bulletin Board Security Testing, Nishitkumar Patel, Hayden Wimmer, and Loreen Marie Powell
Improving the Predictive Performance of the c4.5 Decision Tree Algorithm for Categorical Medical Data, Shaikh Shiam Rahman, Hayden Wimmer, and Carl Rebman
Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl Rebman, Gwendolyn White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker
Enhancing Proactive Control Mobile and Web Software Security Education with Hands-on Labware, Hossain Shahriar, Kai Qian, Atef Shalan, and Fan Wu
Barriers and Drivers to Adoption of Cloud Infrastructure Services: A Security, Michael Towsend, Hayden Wimmer, and Jei Du
Submissions from 2019
Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Powell
Cyber-Security Instructional Technology Design, Billy Carrie, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
Hour of Code: A Study of Gender Differences in Computing, Jei Du and Hayden Wimmer
Impact of Hour of Code: A Five Year Study, Jei Du and Hayden Wimmer
Examining a Deep Learning Network System for Image Identification and Classification for Preventing Unauthorized Access for a Smart Home Security System, Beloved Egbedion, Hayden Wimmer, Carl Rebman, and Loreen Marie Powell
An Exploratory Study on Variances in Perceptions of Smart Home Technologies, Thomas Mendoza, Hayden Wimmer, and Carl Rebman
Learner Security & Privacy Risks: How Usage of Online Social Media Outside a Learning Management Systems Affects Learners’ Digital Identity, Loreen Powell, Hayden Wimmer, Carl Rebman, and Chaza Abdul al
Knowledge Portals: A Review, Hayden Wimmer, Jie Du, and Roy Rada
Submissions from 2018
Effects of Normalization Techniques on Logistic Regression in Data Science, Nureni Adekunle Adeyemo, Hayden Wimmer, and Loreen Marie Powell
Using Geodesic Acceleration with LevMar to Maximize Smart Home Energy Management, Queen E. Booker, Fred L. Kitchens, Hayden Wimmer, and Carl Rebman
Using Ann with Geodesic Acceleration to Maximize Smart Energy Management, Queen E. Booker, Carl Rebman, Hayden Wimmer, and Fred L. Kitchens
Electronic Emergency Medical Technician Reports –Testing A Perception Of A Prototype, Smiljana Cuk, Hayden Wimmer, and Loreen Powell
Exposing The Tor Failures On Mobile Devices Using Paraben’s E3:Ds Technology, Ton H. Don, Hayden Wimmer, Lei Chen, and Queen E. Booker
Diving Into the Darknet: Using Tableau to Shed Some Light On Data Analysis, Ton H. Don, Hayden Wimmer, C. Rebmann, and S. Scheidt
Hour of Code: A Case Study, Jie Du, Hayden Wimmer, and Roy Rada
Building an Application for Custom Mobile Medication Reminders In Healthcare: An Exploratory Study, Beloved Egbedion, Hayden Wimmer, Carl M. Rebman Jr, and Loreen Marie Powell
Skill Requirements in Big Data: A Content Analysis of Job Advertisements, Adrian Gardiner, Cheryl L. Aasheim, Paige Rutner, and Susan Rebstock Williams
Twitter Sentiment Toward Autism During Autism Awareness Month, Jeffrey P. Kaleta, Jingjing Yin, and Sushmita Khan
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP, Olajide Ojagbule, Hayden Wimmer, and Rami Haddad
Trends in Gerotechnology: A Literature Review, Roy Rada, Jie Du, and Hayden Wimmer
Analyzing Data from an Android Smartphone while Comparing between Two Forensic Tools, Majeed Kayode Raji, Hayden Wimmer, and Rami Haddad
A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations, Carl Rebman, Hayden Wimmer, and Queen Booker
A Digital Forensic Tool for Mobile Devices: Paraben, Hitesh Sachdev, Hayden Wimmer, and Lei Chen
A New Framework for Securing, Extracting and Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, and Carl Rebman
Quantum chemical spectral characterization of CH2NH2+ for remote sensing of Titan’s atmosphere, Russell Thackston and Ryan C. Fortenberry
Using Twitter Sentiment Analysis to Analyze Self-Sentiment of the POTUS, Gwen White, Hayden Wimmer, Carl Rebman, and Chrisitan Sunday Nwankwo
Ontologies and the Semantic Web for Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, and Tom Narock
Applying Artificial Intelligence to Financial Investing, Hayden Wimmer and Roy Rada
Submissions from 2017
Improving the Efficiency of Big Forensic Data Analysis Using NoSQL, Md Baitul Al Sadi, Hayden Wimmer, Lei Chen, and Kai Wang
Framework and Challenges: H.265/HEVC Rate Control in Real-Time Transmission over 5G Mobile Networks, Lei Chen, Ming Yang, Luguo Hao, and Danda Rawat
Problems Associated with Patient Care Reports and Transferring Data between Ambulance and Hospitals from the Perspective of Emergency Medical Technicians, Smiljana Cuk, Hayden Wimmer, and Loreen Marie Powell
A Framework and the Design of Secure Mobile Cloud with Smart Load Balancing, Isaac J. Cushman, Md Baitul Al Sadi, Lei Chen, and Rami Haddad
Cooperative Adaptive Cruise Control of Connected and Autonomous Vehicles Subject to Input Saturation, Weinan Gao, Fernando Rios-Gutierrez, Weitian Tong, and Lei Chen
Emotional Intelligence and Communication Levels in Information Technology Professionals, Michalina Hendon, Loreen Powell, and Hayden Wimmer
Enhancing the Security of IoT Enabled Robotics: Protecting TurtleBot File System and Communication, Michael Horton, Lei Chen, and Biswanath Samanta
Email Phishing Susceptibility in a Public School Setting: Identifying at Risk Educators, M. Horton and Hayden Wimmer
Open vs. Close Source Decision Tree Algorithms: Comparing Performance Measures of Accuracy, Sensitivity and Specificity, Sushmita Khan, Hayden Wimmer, and Loreen Marie Powell
Consumer Perceptions about E-Commerce – The Influence of Public Internet Trust, Lakshman Mahadevan and Jeffrey P. Kaleta
Linked Data Scientometrics in Semantic E-Science, Tom Narock and Hayden Wimmer
Predicting Movie Ratings using Sentiment Analysis of Tweets, Christian Nwankwo, Hayden Wimmer, and Jie Du
The Need for an Emotional Intelligence for Information Technology Course: Framework for Educators and Academic Institutions, Loreen Marie Powell, Michalina Hendon, and Hayden Wimmer
Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach, Loreen Marie Powell and Hayden Wimmer
Impact of Online Discussions on Web Based Assessments, Loreen Marie Powell, Hayden Wimmer, Lawrence Kilgus, and Christina M. Force
Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina Force, and Lawrence Kilgus
Key Factors Effecting Career Choice Among Business and Information Technology Students, Loreen Powell, Hayden Wimmer, Christina M. Force, and Lawrence C. Kilgus
Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi
Learning Precursor Programming Skills from Free Mobile Application Development Tools, Loreen Powell, Hayden Wimmer, Michalina Hendon, and Jongsoo Choi
Decision Trees and Financial Variables, Roy Rada and Hayden Wimmer
On the Security of Information Dissemination in the Internet-of-Vehicles, Danda B. Rawat, Moses Garuba, Lei Chen, and Qing Yang
Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring, Joshua Regenold, Kai Wang, Gary Smith, Quingzhong Liu, and Lei Chen
Feeling The Stock Market: A Study in the Prediction of Financial Markets Based on News Sentiment, Max Sorto, Cheryl L. Aasheim, and Hayden Wimmer
An efficient algorithm for the determination of force constants and displacements in numerical definitions of a large, general order Taylor series expansion, Russell Thackston and Ryan C. Fortenberry
Toward the laboratory identification of the not-so-simple NS2 neutral and anion isomers, Russell Thackston, Ryan Fortenberry, Joseph S. Francisco, and Timothy J. Lee
An Advanced Private Social Activity Invitation Framework with Friendship Protection, Weitian Tong, Lei Chen, Scott Buglass, and Weinan Gao
Disentangle Crime Hot Spots and Displacements in Space and Time: An Analysis for Chicago From 2001 to 2016, Kai Wang, Xiaolu Zhou, and Lixin Li
Examining Factors that Influence Intent to Adopt Data Science, Hayden Wimmer and Cheryl L. Aasheim
Improving Course Assessment via Web-Based Homework, Hayden Wimmer, Loreen Marie Powell, Lawrence Kilgus, and Christina Force
Evaluation of Predictive Analytic Techniques in Healthcare Research: A PRISMA Style Review, Hayden Wimmer, Carl M. Rebmann Jr., and Queen E. Booker
Counterfeit Product Detection: Bridging the Gap between Design Science and Behavioral Science in Information Systems Research, Hayden Wimmer and V. Yoon
Submissions from 2016
Detecting Unprotected SIP-Based Voice over IP Traffic, Leonardo Carvajal, Lei Chen, Cihan Varol, and Danda Rawat
Investigating the Security and Digital Forensics of Video Games and Gaming Systems: a Study of PC Games and PS4 Console, Lei Chen, Narasimha Shashidhar, Danda Rawat, Ming Yang, and Christopher A. Kadlec
Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy, Isaac J. Cushman, Lei Chen, Danda Rawat, and Nhien-An Le-Khac
Performance Evaluation of Vehicular Ad Hoc Networks for Rapid Response Traffic Information Delivery, Isaac J. Cushman, Danda B. Rawat, Lei Chen, and Qing Yang
Adaptive Threshold-Based RF Spectrum Scanning Through Joint Energy and Bandwidth Detection with USRPs in Cognitive Sensor Networks for ROAR Architecture, Isaac J. Cushman, Ashraf Younis, Danda Rawat, and Lei Chen
"Hour of Code”: Can It Change Students’ Attitudes Toward Programming?, Jie Du, Hayden Wimmer, and Roy Rada
The Use of Accounting Screens for Separating Winners From Losers Among the S&P 500 Stocks, Victoria Greyfman, Hayden Wimmer, and Roy Rada
An Exploration of Using Twitter Data to Predict the Results of the U.S. Primary Elections, Jeffrey P. Kaleta and Hayden Wimmer
IPv6 Security and Forensics, Vincent Nicolls, Nhien-An Le-Khac, Lei Chen, and Mark Scanlon
Teaching Real-Time Streaming Analytics with Microsoft Azure and Power BI, Loreen Powell, Hayden Wimmer, and Ekene Micheal Nwobodo
Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization, Hitesh Sachdev, Hayden Wimmer, and Lei Chen
A Technical Infrastructure to Integrate Dynamics AX ERP and CRM Into University Curriculum, Hayden Wimmer and Kenneth Hall
Principle Component Analysis for Feature Reduction and Data Preprocessing in Data Science, Hayden Wimmer and Loreen Powell
A Comparison of Open Source Tools for Data Science, Hayden Wimmer and Loreen Marie Powell
A Multi-Agent System to Support Evidence Based Medicine and Clinical Decision Making via Data Sharing and Data Privacy, Hayden Wimmer, Victoria Y. Yoon, and Vijayan Sugumaran
A Routing Algorithm with Path Randomization for Enhanced Security and Balanced Energy Consumption, David C. Yuan and Lei Chen
Submissions from 2015
Data Analytics vs. Data Science: A Study of Similarities and Differences in Undergraduate Programs Based on Course Descriptions, Cheryl L. Aasheim, Paige S. Rutner, Susan Williams, and Adrian Gardiner
Optimal cloud use of quartic force fields: The first purely commercial cloud computing based study for rovibrational analysis of SiCH−, Ryan C. Fortenberry and Russell Thackston
Integrating ERP and CRM into the University Curriculum with Microsoft Dynamics AX and CRM, Kenneth D. Hall and Hayden Wimmer
Evaluating the Effects of Content Reinforcement, Lawrence C. Kilgus, Hayden Wimmer, and Loreen Powell
A Method to Detect AAC Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, and Jing Zhang