Information Technology: Faculty Publications

 

About the Collection

Collection preserves publications by current and former faculty and staff.

Need Help?

Have a question about GS Commons? Need additional description, text alternatives, or captions for GS Commons resources? Contact us or request accessible formats (opens in new tab).

Follow


from 2021

Link

Security Analysis of the Amazon Echo Dot, Robert Brinson, Hayden Wimmer, and Queen Booker

Link

Examining Sigmoid vs ReLu Activation Functions in Deep Learning, Mohammad Anwarul Islam, Hayden Wimmer, and Carl M. Rebman Jr

Link

A Cryptocurrency Prediction Model Using LSTM and GRU Algorithms, Jongyeop Kim, Seongsoo Kim, Hayden Wimmer, and Hong Liu

Link

A Streaming Data Collection and Analysis for Cryptocurrency Price Prediction using LSTM, Jongyeop Kim, Hayden Wimmer, Hong Liu, and Seongsoo Kim

Link

Investigating Bluetooth Vulnerabilities to Defend from Attacks, Patel Nishitkumar, Hayden Wimmer, and Carl M. Rebman Jr

Link

Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution, Nishitkumar Patel, Hayden Wimmer, and Loreen Powell

PDF

Awareness of Blockchain Usage, Structure, & Generation of Platform’s Energy Consumption: Working Towards a Greener Blockchain, Loreen Marie Powell, Michalina Hendon, Andrew Mangle, and Hayden Wimmer

Link

Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl M. Rebman Jr, Gwen White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker

Link

Disruption and Protection of Online Synchronous Learning Environments via 802.11 Manipulation, Matthew Tigner and Hayden Wimmer

Link

Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.

Link

Windows Reverse TCP Attack: The Threat of Out-of-Date Machinery, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.

Link

Deep Learning on Cryptocurrency - Challenges Processing GPU and CPU Architectures, Ian A. Trawinski, Hayden Wimmer, and Weitian Tong

from 2020

Link

An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman

Link

A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer

Link

A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert

Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim

Link

Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman

Link

Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan

Link

An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman

Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr

Link

PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad

Link

Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell

Link

Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell

Link

Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim

Link

Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad