18(top 2%)
papers
474(top 2%)
citations
9(top 2%)
h-index
16(top 2%)
g-index
40
all documents
810
doc citations
393
citing journals

Top Articles

#TitleJournalYearCitations
1Flow Perturbation Mediates Neutrophil Recruitment and Potentiates Endothelial Injury via TLR2 in MiceCirculation Research2017141
2Utilizing webcam-based proctoring to deter misconduct in online examsComputers and Education2016106
3An empirical analysis of feature engineering for predictive modeling2016101
4Deep networks for predicting direction of change in foreign exchange ratesIntelligent Systems in Accounting, Finance and Management201761
5Haemodynamic stress-induced breaches of the arterial intima trigger inflammation and drive atherogenesisEuropean Heart Journal201960
6Comparing dataset characteristics that favor the Apriori, Eclat or FP-Growth frequent itemset mining algorithms201652
7The promise of machine learning in cybersecurity201744
8The Impact of Task Demands on Fixation-Related Brain Potentials during Guided SearchPLoS ONE201641
9Early stabilizing feature importance for TensorFlow deep neural networks201719
10A critical perspective of engagement in online health communitiesEuropean Journal of Information Systems201919
11Polymorphic malware detection using topological feature extraction with data mining201618
12Developing conceptual understanding in a statistics course: Merrill’s First Principles and real data at workEducational Technology Research and Development201714
13Empirical assessment of mobile device users’ information security behavior towards data breachJournal of Intellectual Capital201914
14Capturing, eliciting, and prioritizing (CEP) NFRs in agile software engineering201713
15Assistive Technology Instruction in Teacher Professional DevelopmentJournal of Special Education Technology201813
16Image modeling based on a 2-D stochastic subspace system identification algorithmMultidimensional Systems and Signal Processing201711
17Social Media Systems in the Workplace: Toward Understanding Employee Knowledge Creation via Microblogging within Shared Knowledge DomainsInformatics20169
18Energy modeling and data structure framework for Sustainable Human-Building Ecosystems (SHBE) — a reviewFrontiers in Energy20189
19Subspace algorithms for identifying separable-in-denominator 2D systems with deterministic–stochastic inputsInternational Journal of Control20168
20Utilizing modulating-temperature setpoints to save energy and maintain alliesthesia-based comfortBuilding Research and Information20197
21A hybrid approach to reducing the false positive rate in unsupervised machine learning intrusion detection20166
22A stochastic subspace system identification algorithm for state-space systems in the general 2-D Roesser model formInternational Journal of Control20186
23Machine Learning Methods for Septic Shock Prediction20186
24Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol20185
25Improving the performance of self-organizing maps for intrusion detection20164
26A Hybrid (Active-Passive) Clustering Technique for VANETs20194
27Mobile coupons delivery problem: Postponable online multi-constraint knapsackDecision Support Systems20194
28User Information Security Behavior Towards Data Breach in Bring Your Own Device (BYOD) Enabled Organizations - Leveraging Protection Motivation Theory20183
29Improving Septic Shock Prediction with AdaBoost and Cox Regression Model20213
30Enhanced detection of advanced malicious software20162
31New metrics for assessing aspect coupling20162
32A Knowledge Management System (KMS) using a storytelling-based approach to collect tacit knowledge20162
33Generating Predicate Logic Expressions from Natural Language20212
34LPV system identification using the matchable observable linear identification approach20171
35Subspace algorithm for identifying bilinear repetitive processes with deterministic inputs20160
36Improving privacy preserving methods to enhance data mining for correlation research20170
37Utilizing normative theories to develop ethical actions for better privacy practicesJournal of Information Privacy and Security20170
38Using Protocol Redundancy to Enhance OSPF Network System Survivability20180
39GAMESPECT: Aspect Oriented Programming for a Video Game Engine using Meta-languages20190
40A Projectile Concussive Impact Model Produces Neuroinflammation in Both Mild and Moderate-Severe Traumatic Brain InjuryBrain Sciences20230