Information Technology: Faculty Publications
About the Collection
Collection preserves publications by current and former faculty and staff.
Need Help?
Have a question about GS Commons? Need additional description, text alternatives, or captions for GS Commons resources? Contact us or request accessible formats (opens in new tab).
from 2021
Security Analysis of the Amazon Echo Dot, Robert Brinson, Hayden Wimmer, and Queen Booker
Examining Sigmoid vs ReLu Activation Functions in Deep Learning, Mohammad Anwarul Islam, Hayden Wimmer, and Carl M. Rebman Jr
A Cryptocurrency Prediction Model Using LSTM and GRU Algorithms, Jongyeop Kim, Seongsoo Kim, Hayden Wimmer, and Hong Liu
A Streaming Data Collection and Analysis for Cryptocurrency Price Prediction using LSTM, Jongyeop Kim, Hayden Wimmer, Hong Liu, and Seongsoo Kim
Investigating Bluetooth Vulnerabilities to Defend from Attacks, Patel Nishitkumar, Hayden Wimmer, and Carl M. Rebman Jr
Documenting the Process of Hijacking a Raspberry Pi User Login Credentials via Remote Code Execution, Nishitkumar Patel, Hayden Wimmer, and Loreen Powell
Awareness of Blockchain Usage, Structure, & Generation of Platform’s Energy Consumption: Working Towards a Greener Blockchain, Loreen Marie Powell, Michalina Hendon, Andrew Mangle, and Hayden Wimmer
Pandemic Shift: Impact of Covid-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned, Carl M. Rebman Jr, Gwen White, Hayden Wimmer, Loreen Marie Powell, and Queen Booker
Disruption and Protection of Online Synchronous Learning Environments via 802.11 Manipulation, Matthew Tigner and Hayden Wimmer
Analysis of Kali Linux Penetration Testing Tools: A Survey of Hacking Tools, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.
Windows Reverse TCP Attack: The Threat of Out-of-Date Machinery, Matthew Tigner, Hayden Wimmer, and Carl M. Rebmann Jr.
Deep Learning on Cryptocurrency - Challenges Processing GPU and CPU Architectures, Ian A. Trawinski, Hayden Wimmer, and Weitian Tong
from 2020
An International Review and Study on Perceptions of Security, Adoption, and Implementation of Electronic Health Records, Faith Aliyu, Hayden Wimmer, Loreen Marie Powell, and Carl Rebman
A Comparative Analysis of Business and Non-business Students Awareness of IoT Devices and Security Practices: An Exploratory Study, Queen Booker, Carl Rebman, and Hayden Wimmer
A Practical Low-Cost Security Solution for Log Management and File Integrity Monitoring, Lei Chen, Ming Yang, Hayden Wimmer, and Brittany Wilbert
Predictive Analytics using Machine Learning for Electronic Health Records, Arjumand Fatima, Hayden Wimmer, and Cheryl L. Aasheim
Artificial Intelligence Facial Expression Recognition for Emotion Detection: Performance and Acceptance, Annu George, Hayden Wimmer, and Carl Rebman
Hands-on Lab on Smart City Vulnerability Exploitation, Andrew Gomez, Hossain Shahriar, Victor Clincy, and Atef Shalan
An Exploratory Study of the Perceptions of Library Faculty and Patrons on Library Resources, Kyle Herman, Hayden Wimmer, and Carl Rebman
Crosswalking Electronic Thesis Dissertations Metadata Towards an Integrated Library Database, Kyle Herman, Hayden Wimmer, and Carl M. Rebman Jr
PPTP VPN: An Analysis of the Effects of a DDoS Attack, Joshua Jones, Hayden Wimmer, and Rami Haddad
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Defense and Analysis of Hijacking User Login Credentials via Remote Code Execution and Raspberry PI, Patel Nishitkumar, Hayden Wimmer, and Loreen Marie Powell
Text Classification of Digital Forensic Data, Chrisitan Sunday Nwankwo, Hayden Wimmer, Lei Chen, and Jongyeop Kim
Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack, Johnathan Dain Overstreet, Hayden Wimmer, and Rami Haddad