Emotional intelligence and communication levels in information technology professionals M Hendon, L Powell, H Wimmer Computers in Human Behavior 71, 165-171, 2017 | 120 | 2017 |
" Hour of Code”: Can It Change Students’ Attitudes Toward Programming? J Du, H Wimmer, R Rada Journal of Information Technology Education: Innovations in Practice 15, 53, 2016 | 77 | 2016 |
A multi-agent system to support evidence based medicine and clinical decision making via data sharing and data privacy H Wimmer, VY Yoon, V Sugumaran Decision Support Systems 88, 51-66, 2016 | 70 | 2016 |
A comparison of open source tools for data science H Wimmer, LM Powell Journal of Information Systems Applied Research 9 (2), 4, 2016 | 61 | 2016 |
Evaluating the effectiveness of self-created student screencasts as a tool to increase student learning outcomes in a hands-on computer programming course LM Powell Information Systems Education Journal 13 (5), 106, 2015 | 39 | 2015 |
Vulnerability analysis of content management systems to SQL injection using SQLMAP O Ojagbule, H Wimmer, RJ Haddad SoutheastCon 2018, 1-7, 2018 | 35 | 2018 |
Counterfeit product detection: Bridging the gap between design science and behavioral science in information systems research H Wimmer, VY Yoon Decision Support Systems 104, 1-12, 2017 | 33 | 2017 |
Hour of Code: A study of gender differences in computing J Du, H Wimmer Information Systems Education Journal 17 (4), 91, 2019 | 32 | 2019 |
Evaluating students’ perception of group work for mobile application development learning, productivity, enjoyment and confidence in quality LM Powell, H Wimmer Information Systems Education Journal 14 (3), 85, 2016 | 32 | 2016 |
A comparison of the effects of k-anonymity on machine learning algorithms H Wimmer, L Powell International Journal of Advanced Computer Science and Applications 5 (11), 2014 | 31 | 2014 |
Effects of normalization techniques on logistic regression in data science A Adeyemo, H Wimmer, LM Powell Journal of Information Systems Applied Research 12 (2), 37, 2019 | 24 | 2019 |
Analysis of deep learning libraries: Keras, pytorch, and MXnet S Kim, H Wimmer, J Kim 2022 IEEE/ACIS 20th International Conference on Software Engineering …, 2022 | 23 | 2022 |
Penetration testing of the amazon echo digital voice assistant using a denial-of-service attack D Overstreet, H Wimmer, RJ Haddad 2019 SoutheastCon, 1-6, 2019 | 23 | 2019 |
Analyzing data from an android smartphone while comparing between two forensic tools M Raji, H Wimmer, RJ Haddad SoutheastCon 2018, 1-6, 2018 | 22 | 2018 |
“hour of code”: A case study J Du, H Wimmer, R Rada Information Systems Education Journal 16 (1), 51, 2018 | 22 | 2018 |
Examining factors that influence intent to adopt data science H Wimmer, C Aasheim Journal of Computer Information Systems 59 (1), 43-51, 2019 | 20 | 2019 |
Performance analysis of machine learning algorithm on cloud platforms: AWS vs Azure vs GCP S Jamal, H Wimmer International Scientific and Practical Conference on Information …, 2022 | 19 | 2022 |
Auto-ML cyber security data analysis using Google, Azure and IBM Cloud Platforms E Opara, H Wimmer, CM Rebman 2022 International Conference on Electrical, Computer and Energy …, 2022 | 19 | 2022 |
A cryptocurrency prediction model using LSTM and GRU algorithms J Kim, S Kim, H Wimmer, H Liu 2021 IEEE/ACIS 6th International Conference on Big Data, Cloud Computing …, 2021 | 18 | 2021 |
Integration of EEG and eye tracking technology: a systematic review S Jamal, MV Cruz, S Chakravarthy, C Wahl, H Wimmer SoutheastCon 2023, 209-216, 2023 | 17 | 2023 |