{"response":{"docs":[{"system_create_dtsi":"2020-05-15T23:04:33Z","system_modified_dtsi":"2020-05-15T23:15:48Z","has_model_ssim":["Article"],"id":"dv13zv62n","accessControl_ssim":["b7555794-f737-4fd6-8fd5-3b82b0269623"],"hasRelatedMediaFragment_ssim":["pr76f495c"],"hasRelatedImage_ssim":["pr76f495c"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence"],"date_uploaded_dtsi":"2020-05-15T23:04:33Z","date_modified_dtsi":"2020-05-15T23:04:33Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/sasd-4z96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Adewale, Adewopo Victor","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users. In the past, cyberattacks were usually orchestrated in a random pattern of attack to lure unsuspecting targets. However, the cyber virtual environment is an ecosystem that provided a platform for an organized and sophisticated approach to launch an attack against a specific target group or organization by nefarious actors. In 2019, the average cost of cyber-attack in the US was about $1.6 million. This paper proposes a 3D framework to signal new threat alert before the actual occurrence of the threat on the surface web to alert cybersecurity experts and law enforcement agencies in preventive measures or means of mitigating the severity of damage caused by cyberattacks. The methodology combines information extracted from the deep web through a smart web crawler with socio-personal and technical indicators from twitter which is mapped with OTX (Open Threat Exchange). The OTX is an open-source cyber threat platform managed by security experts. The OTX endpoint security tool(OTX python SDK) will be used to identify a new type of cyber threats. The effectiveness of the framework will be tested using the machine learning algorithm precision-recall rate."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/13 "],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/pr76f495c?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pr76f495c"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["pr76f495c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SCRAPING THE DEEP WEB A 3DIMENSIONAL FRAMEWORK FOR CYBERTHREAT INTELLIGENCE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/dv13zv62n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680855478272,"timestamp":"2021-04-15T06:26:20.247Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:02:12Z","system_modified_dtsi":"2020-05-15T23:02:18Z","has_model_ssim":["Article"],"id":"qv33rz232","accessControl_ssim":["7f04e6fb-3493-481e-be74-061e8c6b5fbc"],"hasRelatedMediaFragment_ssim":["m039k605q"],"hasRelatedImage_ssim":["m039k605q"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes"],"date_uploaded_dtsi":"2020-05-15T23:02:12Z","date_modified_dtsi":"2020-05-15T23:02:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g4dj-bj96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Ponnakanti, Hari Priya","Ozer, Murat","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a notable research on underlying blockchain technology which offers distributed governance, immutable audit trail, provenance of data, robustness and privacy, we contrasted blockchain innovations and identified prominent applications of it in historically decentralized healthcare sectors. As the healthcare industry faces many challenges like unauthorised data sharing, lack of data transparency, ransomware, data breaches and cyber crimes, blockchain is one of the best ways to enhance data sharing and to mitigate prominent cyber crimes. By proper designing of a decentralized and immutable blockchain network where the data is dispersed among credentialed social insurance experts guarantees that cybercriminals cannot touch single patient’s confidential data, which facilitates encryption or cryptography of personal data where no patient’s emergency data is at extreme hazard. Blockchain trust-worthy cloud is one of the most powerful and secure ways of storing high confidential data. After analysing Blockchain implementations and identifying its potential in healthcare, we conclude with several promising directions for future research."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/2"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/m039k605q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["m039k605q"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["m039k605q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RELATIVE IMPORTANCE OF BLOCKCHAIN IN HEALTH CARE ENHANCING DATA SHARING AND MITIGATING CYBER SECURITY CRIMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/qv33rz232"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086685715628032,"timestamp":"2021-04-15T06:26:24.882Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T22:56:38Z","system_modified_dtsi":"2020-05-15T23:16:12Z","has_model_ssim":["Article"],"id":"1z40kv09z","accessControl_ssim":["46d78754-13db-4305-a31a-27bc1d17960d"],"hasRelatedMediaFragment_ssim":["dr26xz84f"],"hasRelatedImage_ssim":["dr26xz84f"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Application of Autoencoder Duets in Anomaly and Intrusion Detection"],"date_uploaded_dtsi":"2020-05-15T22:56:38Z","date_modified_dtsi":"2020-05-15T22:56:38Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/vm3m-xy59"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Li, Chengcheng","Lee, Kijung","Mathur, Nitin","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Signature-based intrusion detection methods report high accuracy with a low false alarm rate. However, they do not perform well when faced with new or emerging threats. This work focuses on anomaly-based data driven methods to identify potential zero-day-attacks using a specific class of neural networks known as the autoencoder."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/10"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/dr26xz84f?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["dr26xz84f"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["dr26xz84f"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"APPLICATION OF AUTOENCODER DUETS IN ANOMALY AND INTRUSION DETECTION","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/1z40kv09z"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086688839335936,"timestamp":"2021-04-15T06:26:27.861Z","score":0.00049999997},{"system_create_dtsi":"2019-07-22T14:45:19Z","system_modified_dtsi":"2021-01-30T04:02:26Z","has_model_ssim":["Article"],"id":"3197xn19c","accessControl_ssim":["65a68c4c-cd73-4291-9631-809d39b81af4"],"hasRelatedMediaFragment_ssim":["6t053h23g"],"hasRelatedImage_ssim":["6t053h23g"],"depositor_ssim":["ajmerahu@mail.uc.edu"],"depositor_tesim":["ajmerahu@mail.uc.edu"],"title_tesim":["Virtual Reality in Healthcare"],"date_uploaded_dtsi":"2019-07-22T14:45:19Z","date_modified_dtsi":"2021-01-30T04:02:04Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/93y7-t513"],"alternate_title_tesim":["VR in Healthcare"],"geo_subject_tesim":["Cincinnati, Ohio"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Ajmera, Himanshu","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["AR vs VR ","Immersion Breaking points","Healthcare","Virtual Reality"],"language_tesim":["English"],"description_tesim":["This paper presents a prime aspect of Augmented and Virtual Reality development in the field of healthcare. We explored several recent works and articles and a comparison between generic application development and immersive technology-based application is included. The paper talks about more practical approaches that can be taken to enhance the effectiveness of the application. \r\nThe resources (infrastructure) to complete this study are provided by the University of Cincinnati’s Center for Simulation and Virtual Environment Research (UCSIM). And several experiments and projects in the field of health care are used as a reference to make conclusions. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2019-05-08"],"thumbnail_path_ss":"/downloads/6t053h23g?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6t053h23g"],"file_set_ids_ssim":["6t053h23g"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL REALITY IN HEALTHCARE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"read_access_person_ssim":["gonenbl@ucmail.uc.edu"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ajmerahu@mail.uc.edu"],"nesting_collection__pathnames_ssim":["3197xn19c"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697123083066802176,"timestamp":"2021-04-15T16:04:56.101Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":4,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Gonen, Bilal","hits":4,"label":"Gonen, Bilal"},{"value":"Adewale, Adewopo Victor","hits":1,"label":"Adewale, Adewopo Victor"},{"value":"Ajmera, Himanshu","hits":1,"label":"Ajmera, Himanshu"},{"value":"Lee, Kijung","hits":1,"label":"Lee, Kijung"},{"value":"Li, Chengcheng","hits":1,"label":"Li, Chengcheng"},{"value":"Mathur, Nitin","hits":1,"label":"Mathur, Nitin"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Technology","hits":3,"label":"Information Technology"},{"value":"AR vs VR ","hits":1,"label":"AR vs VR "},{"value":"Healthcare","hits":1,"label":"Healthcare"},{"value":"Immersion Breaking points","hits":1,"label":"Immersion Breaking points"},{"value":"Virtual Reality","hits":1,"label":"Virtual Reality"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":4,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"- School of Information Technology","hits":3,"label":"- School of Information Technology"},{"value":"School of Information Technology","hits":1,"label":"School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":4,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":4,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04-14","hits":3,"label":"2020-04-14"},{"value":"2019-05-08","hits":1,"label":"2019-05-08"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"ws859g993","hits":3,"label":"ws859g993"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":4,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":4,"first_page?":true,"last_page?":true}}}