default search action
Hayden Wimmer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Suhaima Jamal, Hayden Wimmer, Iqbal H. Sarker:
An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach. Secur. Priv. 7(5) (2024) - 2023
- [c13]Oluwatomisin Arokodare, Hayden Wimmer, Jie Du:
Big Data Approach For IoT Botnet Traffic Detection Using Apache Spark Technology. CCWC 2023: 1260-1266 - [c12]Daniel Ukene, Hayden Wimmer, Jongyeop Kim:
Evaluating the Performance of Containerized Webservers against web servers on Virtual Machines using Bombardment and Siege. SERA 2023: 144-152 - [c11]Ian Trawinski, Hayden Wimmer, Jongyeop Kim:
Anomaly Detection in Intrusion Detection System using Amazon SageMaker. SERA 2023: 210-217 - [i1]Suhaima Jamal, Hayden Wimmer:
An Improved Transformer-based Model for Detecting Phishing, Spam, and Ham: A Large Language Model Approach. CoRR abs/2311.04913 (2023) - 2022
- [j18]Nhuong Bui, Zachary Moore, Hayden Wimmer, Long Pham:
Predicting Customer Loyalty in the Mobile Banking Setting: An Integrated Approach. Int. J. E Serv. Mob. Appl. 14(1): 1-22 (2022) - [c10]Seongsoo Kim, Hayden Wimmer, Jongyeop Kim:
Analysis of Deep Learning Libraries: Keras, PyTorch, and MXnet. SERA 2022: 54-62 - [c9]Omotola Adekanbmi, Hayden Wimmer, Jongyeop Kim:
Big Cyber Security Data Analysis with Apache Mahou. SERA 2022: 83-90 - 2021
- [c8]Jongyeop Kim, Seongsoo Kim, Hayden Wimmer, Hong Liu:
A Cryptocurrency Prediction Model Using LSTM and GRU Algorithms. BCD 2021: 37-44 - [c7]Jongyeop Kim, Hayden Wimmer, Hong Liu, Seongsoo Kim:
A Streaming Data Collection and Analysis for Cryptocurrency Price Prediction using LSTM. BCD 2021: 45-52 - [c6]Samuel Grone, Weitian Tong, Hayden Wimmer, Yao Xu:
Arbitrage Behavior amongst Multiple Cryptocurrency Exchange Markets. CSCI 2021: 527-532
2010 – 2019
- 2019
- [j17]Hayden Wimmer, Jie Du, Roy Rada:
Knowledge Portals: A Review. Int. J. Knowl. Manag. 15(1): 1-18 (2019) - [j16]Hayden Wimmer, Cheryl Aasheim:
Examining Factors that Influence Intent to Adopt Data Science. J. Comput. Inf. Syst. 59(1): 43-51 (2019) - [c5]Jie Du, Hayden Wimmer:
Impact of Hour of Code: A Five-Year Study. AMCIS 2019 - 2018
- [j15]Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl M. Rebman:
A New Framework for Securing, Extracting and Analyzing Big Forensic Data. J. Digit. Forensics Secur. Law 13(2): 6:1-6:17 (2018) - [j14]Hayden Wimmer, Lei Chen, Thomas W. Narock:
Ontologies and the Semantic Web for Digital Investigation Tool Selection. J. Digit. Forensics Secur. Law 13(3): 21-46 (2018) - 2017
- [j13]Michalina Hendon, Loreen M. Powell, Hayden Wimmer:
Emotional intelligence and communication levels in information technology professionals. Comput. Hum. Behav. 71: 165-171 (2017) - [j12]Hayden Wimmer, Victoria Y. Yoon:
Counterfeit product detection: Bridging the gap between design science and behavioral science in information systems research. Decis. Support Syst. 104: 1-12 (2017) - [j11]Tom Narock, Hayden Wimmer:
Linked data scientometrics in semantic e-Science. Comput. Geosci. 100: 87-93 (2017) - [j10]Loreen M. Powell, Hayden Wimmer, Lawrence Kilgus, Christina M. Force:
Impact of Online Discussions on Web Based Assessments. Int. J. Distance Educ. Technol. 15(4): 99-111 (2017) - [j9]Roy Rada, Hayden Wimmer:
Decision Trees and Financial Variables. Int. J. Decis. Support Syst. Technol. 9(1): 1-15 (2017) - [j8]Hayden Wimmer, Loreen M. Powell, Lawrence Kilgus, Christina M. Force:
Improving Course Assessment via Web-based Homework. Int. J. Online Pedagog. Course Des. 7(2): 1-19 (2017) - 2016
- [j7]Hayden Wimmer, Victoria Y. Yoon, Vijayan Sugumaran:
A multi-agent system to support evidence based medicine and clinical decision making via data sharing and data privacy. Decis. Support Syst. 88: 51-66 (2016) - [j6]Jie Du, Hayden Wimmer, Roy Rada:
"Hour of Code": Can It Change Students' Attitudes toward Programming? J. Inf. Technol. Educ. Innov. Pract. 15: 53-73 (2016) - [c4]Hitesh Sachdev, Hayden Wimmer, Lei Chen:
Improving Real-Time Data Streaming Security to Promote Patient and Physician Socialization. BDCloud-SocialCom-SustainCom 2016: 309-316 - 2015
- [j5]Hayden Wimmer, Roy Rada:
Good versus bad knowledge: Ontology guided evolutionary algorithms. Expert Syst. Appl. 42(21): 8039-8051 (2015) - [c3]Hayden Wimmer, Victoria Y. Yoon:
Leveraging Technology to Improve Intent to Purchase. ICEC 2015: 33:1-33:5 - 2014
- [j4]Jie Du, Hayden Wimmer, Roy Rada:
Knowledge constrained evolutionary algorithms: a case study for financial investing. Int. J. Artif. Intell. Soft Comput. 4(4): 335-353 (2014) - [c2]Hayden Wimmer:
A Multi-Agent System for Healthcare Data Privacy. AMCIS 2014 - 2013
- [j3]Hayden Wimmer, Victoria Y. Yoon, Roy Rada:
Integrating Knowledge Sources: An Ontological Approach. Int. J. Knowl. Manag. 9(1): 60-75 (2013) - [c1]Hayden Wimmer, Lina Zhou:
Word Sense Disambiguation for Ontology Learning. AMCIS 2013 - 2012
- [j2]Hayden Wimmer, Guisseppi A. Forgionne, Roy Rada, Victoria Y. Yoon:
A Conceptual Model for Knowledge Marts for Decision Making Support Systems. Int. J. Decis. Support Syst. Technol. 4(4): 24-38 (2012) - [j1]Hayden Wimmer, Victoria Y. Yoon, Roy Rada:
Applying Semantic Web Technologies to Ontology Alignment. Int. J. Intell. Inf. Technol. 8(1): 1-9 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint