{"response":{"docs":[{"system_create_dtsi":"2020-06-15T13:38:26Z","system_modified_dtsi":"2020-07-10T14:47:35Z","has_model_ssim":["StudentWork"],"id":"v692t7622","accessControl_ssim":["f93f46a0-d85d-4bd8-829a-3c0b2214ffb3"],"hasRelatedMediaFragment_ssim":["q811km15s"],"hasRelatedImage_ssim":["q811km15s"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["1819 Innovation Hub Mobile App"],"date_uploaded_dtsi":"2020-06-15T13:38:26Z","date_modified_ssi":"Fri Jul 10 10:47:33 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Demoss, Cameron","Holschuh, Chris","Burns, Aidan"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Have you had a chance to visit the 1819 Innovation hub yet? If not, you're probably not familiar with all the exciting opportunities and services the building has to offer. To some, the possibilities at 1819 can be quite overwhelming, but with the 1819 Mobile app, we make these opportunities more approachable. With our location based informational beacons and seamless check-in pre-registration process, you can skip to the front of the line and get right to work on your latest ideas and inventions. Using Apple’s Core Location services, the power of Swift, and the latest in Bluetooth low energy beacon technology, the 1819 Mobile app provides you with up to date contextual information about key locations within the University of Cincinnati’s 1819 Innovation Hub. The 1819 Mobile app ensures that you have access to the tools and information needed to succeed in your visit."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2020-04"],"thumbnail_path_ss":"/downloads/q811km15s?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["q811km15s","kd17cv201"],"member_of_collections_ssim":["2020 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["7d278v66w"],"file_set_ids_ssim":["q811km15s","kd17cv201"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000001819 INNOVATION HUB MOBILE APP","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["7d278v66w"],"nesting_collection__parent_ids_ssim":["7d278v66w"],"nesting_collection__pathnames_ssim":["7d278v66w/v692t7622"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086720583925760,"timestamp":"2021-04-15T06:26:58.135Z","score":0.00049999997},{"system_create_dtsi":"2020-06-02T20:10:54Z","system_modified_dtsi":"2020-06-02T20:11:05Z","has_model_ssim":["Document"],"id":"h989r465n","accessControl_ssim":["aa4821d9-c67a-44a2-a399-af492f46c318"],"hasRelatedMediaFragment_ssim":["7w62f959q"],"hasRelatedImage_ssim":["7w62f959q"],"depositor_ssim":["finkelfd@ucmail.uc.edu"],"depositor_tesim":["finkelfd@ucmail.uc.edu"],"title_tesim":["Promotion of food allergy by the unfolded protein response (preprint)"],"date_uploaded_dtsi":"2020-06-02T20:10:54Z","date_modified_dtsi":"2020-06-02T20:10:54Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/s0m9-8266"],"alternate_title_tesim":["Promotion of food allergy by the UPR"],"genre_tesim":["Manuscript"],"note_tesim":["This is a preprint of a scientific paper that will be submitted for publication"],"college_tesim":["Medicine"],"department_tesim":["IM Immunology Division"],"creator_tesim":["Finkelman, Fred"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["UPR","Immunology","Allergy"],"language_tesim":["English"],"description_tesim":["This is a preprint of a to be submitted paper that demonstrates that: (1) many important food allergens (eggs, milk, peanuts, tree nuts) induce the unfolded protein response (UPR) in intestinal epithelial cells; (2) induction of the UPR, in turn, stimulates the expression of pro-Th2 cytokines (IL-25, IL-33, TSLP) that are required for the induction of food allergy by these cytokines; (3) egg allergy is suppressed in mouse models by the UPR inhibitor, metformin (a drug widely used to treat diabetes mellitus); and (4) metformin appears to have a protective effects in humans who have alpha-gal syndrome, which is a form of food allergy."],"license_tesim":["http://www.opendatacommons.org/licenses/by/1.0/"],"date_created_tesim":["2020-06-02"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["7w62f959q"],"file_set_ids_ssim":["7w62f959q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PROMOTION OF FOOD ALLERGY BY THE UNFOLDED PROTEIN RESPONSE PREPRINT","human_readable_type_tesim":["Document"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["finkelfd@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["h989r465n"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697129595085520896,"timestamp":"2021-04-15T17:48:26.446Z","score":0.00049999997},{"system_create_dtsi":"2020-05-22T16:42:15Z","system_modified_dtsi":"2020-05-22T22:03:18Z","has_model_ssim":["GenericWork"],"id":"j3860821t","accessControl_ssim":["96188d4e-ce7f-4b22-b27a-ec49da531ff7"],"hasRelatedMediaFragment_ssim":["3j333346p"],"hasRelatedImage_ssim":["3j333346p"],"depositor_ssim":["niunn@ucmail.uc.edu"],"depositor_tesim":["niunn@ucmail.uc.edu"],"title_tesim":["Data of SysML SMD Environment Assumptions"],"date_uploaded_dtsi":"2020-05-22T16:42:15Z","date_modified_dtsi":"2020-05-22T22:03:12Z","isPartOf_ssim":["admin_set/default"],"on_behalf_of_ssim":[""],"doi_tesim":["doi:10.7945/n0g0-j524"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["- Computing Sciences \u0026 Informatics"],"creator_tesim":["Alenazi, Mounifah","Niu, Nan"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Software Engineering","Model-Driven Engineering","Requirements Engineering"],"description_tesim":["Environment assumptions elicited from human modelers for a SysML state machine diagram (SMD) in the context of satisfaction of a safety requirement."],"license_tesim":["http://opendatacommons.org/licenses/dbcl/1.0/"],"date_created_tesim":["2020-05-22"],"thumbnail_path_ss":"/downloads/3j333346p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["3j333346p"],"file_set_ids_ssim":["3j333346p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DATA OF SYSML SMD ENVIRONMENT ASSUMPTIONS","human_readable_type_tesim":["Generic Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["niunn@ucmail.uc.edu"],"nesting_collection__pathnames_ssim":["j3860821t"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697096227183656960,"timestamp":"2021-04-15T08:58:04.335Z","score":0.00049999997},{"system_create_dtsi":"2020-05-19T13:41:48Z","system_modified_dtsi":"2020-05-19T13:43:54Z","has_model_ssim":["StudentWork"],"id":"xs55md14n","accessControl_ssim":["46cb1547-f411-44f3-a8f2-dbba3c0364dd"],"hasRelatedMediaFragment_ssim":["xd07gt94c"],"hasRelatedImage_ssim":["xd07gt94c"],"depositor_ssim":["ceas.library@uc.edu"],"depositor_tesim":["ceas.library@uc.edu"],"title_tesim":["2020 BUV (basic utility vehicle): steering and suspension"],"date_uploaded_dtsi":"2020-05-19T13:41:47Z","date_modified_dtsi":"2020-05-19T13:42:57Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/8ygf-hr22"],"advisor_tesim":["Cummings, Moise"],"degree_tesim":["BS"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["Mechanical Engineering Technology"],"genre_tesim":["Document"],"creator_tesim":["Lamascid, Gustavo"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Senior design capstone report"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["sq87bw072","xd07gt94c"],"member_of_collections_ssim":["CEAS Mechanical Engineering Technology (MET) Senior Design Projects"],"member_of_collection_ids_ssim":["bc387z838"],"file_set_ids_ssim":["sq87bw072","xd07gt94c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000002020 BUV BASIC UTILITY VEHICLE STEERING AND SUSPENSION","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ceas.library@uc.edu"],"nesting_collection__ancestors_ssim":["xg94hr243","xg94hr243/bc387z838"],"nesting_collection__parent_ids_ssim":["bc387z838"],"nesting_collection__pathnames_ssim":["xg94hr243/bc387z838/xs55md14n"],"nesting_collection__deepest_nested_depth_isi":3,"_version_":1697090647101538304,"timestamp":"2021-04-15T07:29:22.754Z","score":0.00049999997},{"system_create_dtsi":"2020-05-18T17:33:52Z","system_modified_dtsi":"2020-05-18T17:36:09Z","has_model_ssim":["StudentWork"],"id":"g445cf39n","accessControl_ssim":["1b354a2b-1781-4bc0-92bd-a082eec131ee"],"hasRelatedMediaFragment_ssim":["cn69m539w"],"hasRelatedImage_ssim":["cn69m539w"],"depositor_ssim":["ceas.library@uc.edu"],"depositor_tesim":["ceas.library@uc.edu"],"title_tesim":["46mm end cap: cost savings"],"date_uploaded_dtsi":"2020-05-18T17:33:51Z","date_modified_dtsi":"2020-05-18T17:34:49Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/zdzy-3k11"],"advisor_tesim":["Al-Ubaidi, Muthar"],"degree_tesim":["BS"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["Mechanical Engineering Technology"],"genre_tesim":["Document"],"creator_tesim":["McCartney, Dan"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Senior design capstone report"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/downloads/cn69m539w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["9g54xk04m","cn69m539w"],"member_of_collections_ssim":["CEAS Mechanical Engineering Technology (MET) Senior Design Projects"],"member_of_collection_ids_ssim":["bc387z838"],"file_set_ids_ssim":["9g54xk04m","cn69m539w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000046MM END CAP COST SAVINGS","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ceas.library@uc.edu"],"nesting_collection__ancestors_ssim":["xg94hr243","xg94hr243/bc387z838"],"nesting_collection__parent_ids_ssim":["bc387z838"],"nesting_collection__pathnames_ssim":["xg94hr243/bc387z838/g445cf39n"],"nesting_collection__deepest_nested_depth_isi":3,"_version_":1697090650650968064,"timestamp":"2021-04-15T07:29:26.139Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:09:49Z","system_modified_dtsi":"2020-05-15T23:14:46Z","has_model_ssim":["Article"],"id":"m326m3092","accessControl_ssim":["49fa97c5-46f8-4606-a4c9-9b710c33221e"],"hasRelatedMediaFragment_ssim":["p2676w829"],"hasRelatedImage_ssim":["p2676w829"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm"],"date_uploaded_dtsi":"2020-05-15T23:09:49Z","date_modified_dtsi":"2020-05-15T23:09:49Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/r3qd-fz22"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Azumah, Sylvia Worlali","Li, Chengcheng"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a  detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a  SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.  \r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/17"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/p2676w829?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p2676w829"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["p2676w829"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SECURING A SMALL OFFICE HOME OFFICE NETWORK INTEGRATING A SUPERVISED NEURAL NETWORK ALGORITHM","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/m326m3092"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680363696128,"timestamp":"2021-04-15T06:26:19.778Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:08:12Z","system_modified_dtsi":"2020-05-15T23:15:13Z","has_model_ssim":["Article"],"id":"hq37vp88t","accessControl_ssim":["3ebee09e-1b06-4376-b2b7-07f36fd09562"],"hasRelatedMediaFragment_ssim":["5425kc00j"],"hasRelatedImage_ssim":["5425kc00j"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Implementation of a hybrid machine learning technique for network intrusion detection"],"date_uploaded_dtsi":"2020-05-15T23:08:11Z","date_modified_dtsi":"2020-05-15T23:08:11Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/0nqd-j038"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Eichie, Maxwell"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["The current rapid growth in the computer and internet development has ushered in numerous cybersecurity challenges which are constantly evolving with time. The current cybersecurity solutions are no longer optimal in tackling these emerging cyber threats and attacks. This paper proposes the creation of a cybersecurity dataset to be used for a hybrid machine learning (ML) approach of supervised and unsupervised learning for an effective intrusion detection system. The proposed model entails a five-stage process which starts at the setup of a simulated network environment of network attacks to generate a dataset which feeds into the data normalization stage and then to data dimension reduction stage using the principal component analysis as a feature extraction method after which the data of reduced dimension is clustered using the k-Means method to bring about a new data set with fewer features. This new dataset is afterward classified using the enhanced support vector machine (ESVM). The proposed model is expected to provide a high-quality dataset and an efficient intrusion detection system in terms of intrusion detection accuracy of 99.5%, short train time of 3seconds and a low false-positive rate of 0.4%. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/16"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/5425kc00j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5425kc00j"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["5425kc00j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IMPLEMENTATION OF A HYBRID MACHINE LEARNING TECHNIQUE FOR NETWORK INTRUSION DETECTION","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/hq37vp88t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086681729990656,"timestamp":"2021-04-15T06:26:21.081Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:06:29Z","system_modified_dtsi":"2020-05-15T23:15:31Z","has_model_ssim":["Article"],"id":"f1881n26p","accessControl_ssim":["ca9b438e-5e61-4d3f-9d85-8b51bfa48298"],"hasRelatedMediaFragment_ssim":["1v53jz342"],"hasRelatedImage_ssim":["1v53jz342"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots"],"date_uploaded_dtsi":"2020-05-15T23:06:28Z","date_modified_dtsi":"2020-05-15T23:06:28Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/x6f0-b209"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Hussein, Abdul Aziz","Ozer, Murat"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This research focuses on two fundamental aspects of hot spot policing that have been widely neglected by previous scholarly research. These aspects include the adequate concentration of crime at a smaller geographical unit to be considered a crime hot spot, and the cost-benefit implication of focusing limited police resources on such a smaller place in an effort to prevent criminal activities. Substantial limitations in call-t- service data from police departments raise concern on the purported concentration of crime at places that warrant such strategy in the first place. We will examine data from the Cincinnati Police Department and propose guidelines on adopting a threshold when designating places as crime hot spots, using time and cost-benefit analysis as key determinants."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/15"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/1v53jz342?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["1v53jz342"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["1v53jz342"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CRIME HOT SPOTS PROPOSING A NEW MODEL FOR APPROPRIATE IDENTIFICATION OF CRIME HOT SPOTS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/f1881n26p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086682252181504,"timestamp":"2021-04-15T06:26:21.579Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:04:33Z","system_modified_dtsi":"2020-05-15T23:15:48Z","has_model_ssim":["Article"],"id":"dv13zv62n","accessControl_ssim":["b7555794-f737-4fd6-8fd5-3b82b0269623"],"hasRelatedMediaFragment_ssim":["pr76f495c"],"hasRelatedImage_ssim":["pr76f495c"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence"],"date_uploaded_dtsi":"2020-05-15T23:04:33Z","date_modified_dtsi":"2020-05-15T23:04:33Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/sasd-4z96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Adewale, Adewopo Victor","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Cyberspace is one of the most complex systems ever built by humans. The utilization of cybertechnology resources are used ubiquitously by many, but sparsely understood by the majority of the users. In the past, cyberattacks were usually orchestrated in a random pattern of attack to lure unsuspecting targets. However, the cyber virtual environment is an ecosystem that provided a platform for an organized and sophisticated approach to launch an attack against a specific target group or organization by nefarious actors. In 2019, the average cost of cyber-attack in the US was about $1.6 million. This paper proposes a 3D framework to signal new threat alert before the actual occurrence of the threat on the surface web to alert cybersecurity experts and law enforcement agencies in preventive measures or means of mitigating the severity of damage caused by cyberattacks. The methodology combines information extracted from the deep web through a smart web crawler with socio-personal and technical indicators from twitter which is mapped with OTX (Open Threat Exchange). The OTX is an open-source cyber threat platform managed by security experts. The OTX endpoint security tool(OTX python SDK) will be used to identify a new type of cyber threats. The effectiveness of the framework will be tested using the machine learning algorithm precision-recall rate."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/13 "],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/pr76f495c?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pr76f495c"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["pr76f495c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SCRAPING THE DEEP WEB A 3DIMENSIONAL FRAMEWORK FOR CYBERTHREAT INTELLIGENCE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/dv13zv62n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680855478272,"timestamp":"2021-04-15T06:26:20.247Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:02:12Z","system_modified_dtsi":"2020-05-15T23:02:18Z","has_model_ssim":["Article"],"id":"qv33rz232","accessControl_ssim":["7f04e6fb-3493-481e-be74-061e8c6b5fbc"],"hasRelatedMediaFragment_ssim":["m039k605q"],"hasRelatedImage_ssim":["m039k605q"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes"],"date_uploaded_dtsi":"2020-05-15T23:02:12Z","date_modified_dtsi":"2020-05-15T23:02:12Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/g4dj-bj96"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Ponnakanti, Hari Priya","Ozer, Murat","Gonen, Bilal"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This paper looks at the opportunities and challenges of implementing blockchain technology across the medical sector and provides a clear view which can enable blockchain for more extents. After a notable research on underlying blockchain technology which offers distributed governance, immutable audit trail, provenance of data, robustness and privacy, we contrasted blockchain innovations and identified prominent applications of it in historically decentralized healthcare sectors. As the healthcare industry faces many challenges like unauthorised data sharing, lack of data transparency, ransomware, data breaches and cyber crimes, blockchain is one of the best ways to enhance data sharing and to mitigate prominent cyber crimes. By proper designing of a decentralized and immutable blockchain network where the data is dispersed among credentialed social insurance experts guarantees that cybercriminals cannot touch single patient’s confidential data, which facilitates encryption or cryptography of personal data where no patient’s emergency data is at extreme hazard. Blockchain trust-worthy cloud is one of the most powerful and secure ways of storing high confidential data. After analysing Blockchain implementations and identifying its potential in healthcare, we conclude with several promising directions for future research."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/2"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/m039k605q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["m039k605q"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["m039k605q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"RELATIVE IMPORTANCE OF BLOCKCHAIN IN HEALTH CARE ENHANCING DATA SHARING AND MITIGATING CYBER SECURITY CRIMES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/qv33rz232"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086685715628032,"timestamp":"2021-04-15T06:26:24.882Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Etd","hits":994,"label":"Etd"},{"value":"Image","hits":786,"label":"Image"},{"value":"Student Work","hits":675,"label":"Student Work"},{"value":"Document","hits":153,"label":"Document"},{"value":"Dataset","hits":145,"label":"Dataset"},{"value":"Article","hits":139,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"},{"value":"Depoe, Steve","hits":77,"label":"Depoe, Steve"},{"value":"Fitzsimons, Rodney","hits":76,"label":"Fitzsimons, Rodney"},{"value":"McCabe, Erin E.","hits":58,"label":"McCabe, Erin E."},{"value":"Acheson, Phoebe","hits":57,"label":"Acheson, Phoebe"},{"value":"Library Service, CECH","hits":49,"label":"Library Service, CECH"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information technology","hits":225,"label":"Information technology"},{"value":"Music","hits":135,"label":"Music"},{"value":"Geology","hits":113,"label":"Geology"},{"value":"Environmental Communication","hits":77,"label":"Environmental Communication"},{"value":"Design","hits":71,"label":"Design"},{"value":"Chemistry, Organic","hits":57,"label":"Chemistry, Organic"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Other","hits":1013,"label":"Other"},{"value":"Arts and Sciences","hits":901,"label":"Arts and Sciences"},{"value":"Education, Criminal Justice, and Human Services","hits":469,"label":"Education, Criminal Justice, and Human Services"},{"value":"Engineering and Applied Science","hits":258,"label":"Engineering and Applied Science"},{"value":"Libraries","hits":159,"label":"Libraries"},{"value":"Design, Architecture, Art and Planning","hits":132,"label":"Design, Architecture, Art and Planning"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Other","hits":992,"label":"Other"},{"value":"Classics","hits":767,"label":"Classics"},{"value":"Information Engineering Technology","hits":225,"label":"Information Engineering Technology"},{"value":"Mechanical Engineering Technology","hits":190,"label":"Mechanical Engineering Technology"},{"value":"Information Technology","hits":169,"label":"Information Technology"},{"value":"SCFMS Adjuncts","hits":77,"label":"SCFMS Adjuncts"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1412,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"Spanish","hits":17,"label":"Spanish"},{"value":"German","hits":5,"label":"German"},{"value":"French","hits":4,"label":"French"},{"value":"English ","hits":2,"label":"English "}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"Dispute Resolution Institute Press","hits":28,"label":"Dispute Resolution Institute Press"},{"value":"College of Design, Architecture, Art and Planning","hits":1,"label":"College of Design, Architecture, Art and Planning"},{"value":"ICAERA'2016","hits":1,"label":"ICAERA'2016"},{"value":"International Journal of Plant Sciences","hits":1,"label":"International Journal of Plant Sciences"},{"value":"Johns Hopkins University","hits":1,"label":"Johns Hopkins University"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"},{"value":"2003","hits":89,"label":"2003"},{"value":"2017-10-31","hits":75,"label":"2017-10-31"},{"value":"2001-03-18","hits":69,"label":"2001-03-18"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"bc387z838","hits":187,"label":"bc387z838"},{"value":"d504rk335","hits":70,"label":"d504rk335"},{"value":"7d278v66w","hits":50,"label":"7d278v66w"},{"value":"bc3888732","hits":42,"label":"bc3888732"},{"value":"vq27zp836","hits":37,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":3005,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":55,"next_page":56,"prev_page":54,"total_pages":301,"limit_value":10,"offset_value":540,"total_count":3005,"first_page?":false,"last_page?":false}}}