Search Constraints
Filtering by:
College
Education, Criminal Justice, and Human Services
Remove constraint College: Education, Criminal Justice, and Human Services
Type of Work
Article
Remove constraint Type of Work: Article
Language
English
Remove constraint Language: English
Publisher
University of Cincinnati
Remove constraint Publisher: University of Cincinnati
1 - 27 of 27
Number of results to display per page
Search Results
Select an image to start the slideshow
Cyber Threats and Security for Small Business
1 of 27
Developing Standardized Guidelines for Medical Virtual Reality Training
2 of 27
The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry
3 of 27
Challenges in Intelligent Applications development
4 of 27
Virtual Reality in Healthcare
5 of 27

An Overview of the next phase of Virtualization
6 of 27
OPTIMIZING PATIENT-CENTERED MOBILE APPLICATIONS USING DATA MINING TECHNIQUES
7 of 27
Minimal Criteria: Minimizing User Input and User Interface for Faster Output in Minimalistic Mobile Applications
8 of 27
Predicting Future Shooting Crime Locations Using Principles of Data Analytics (SHOPS)
9 of 27
A LOOK AT EDGELESS HYBRID-CLOUD INFRASTRUCTURE – AN OPTIMIZED SOLUTION FOR MULTI-SITE BACKUP, DISASTER RECOVERY AND HIGH AVAILABILITY
10 of 27
PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM
11 of 27
Finding Actionable Information on Social Media
12 of 27
Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber Threats
13 of 27
Enhancing Physical and Cyber Security of Smart Homes using Co-Monitoring of IoT Devices
14 of 27

Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach
15 of 27
Understanding Decision-Making Needs of Open Government Data Users
16 of 27
Smart Home Repos: Taking Data from Devices
17 of 27
A Community-based Approach to Co-Managing Privacy and Security in Smart Homes
18 of 27
Social Networks of Technology Caregivers and Caregivees
19 of 27
Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models
20 of 27
Application of Autoencoder Duets in Anomaly and Intrusion Detection
21 of 27
Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes
22 of 27
Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
23 of 27
Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots
24 of 27
Implementation of a hybrid machine learning technique for network intrusion detection
25 of 27
Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm
26 of 27
Does the One-China policy shape the People’s Republic of China’s foreign policy?: Soft, sharp, and hard power
27 of 27