Search Constraints
Filtering by:
College
Education, Criminal Justice, and Human Services
Remove constraint College: Education, Criminal Justice, and Human Services
Language
English
Remove constraint Language: English
1 - 37 of 37
Number of results to display per page
Search Results
Select an image to start the slideshow

Virtual Reality in Healthcare
1 of 37

How the UK Can Lead in 5G and 6G Security and Standards
2 of 37
Does the One-China policy shape the People’s Republic of China’s foreign policy?: Soft, sharp, and hard power
3 of 37
WORKING DRAFT - 5G and International Security: How the UK can Lead the Way
4 of 37
Establishing a comprehensive census of undergraduate economics curricula: Foundational and special requirements for major programs in the U.S.
5 of 37
Smart Home Repos: Taking Data from Devices
6 of 37
Application of Autoencoder Duets in Anomaly and Intrusion Detection
7 of 37
Scraping The Deep Web: A 3-Dimensional Framework For Cyber-Threat Intelligence
8 of 37
Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots
9 of 37
Implementation of a hybrid machine learning technique for network intrusion detection
10 of 37
Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm
11 of 37
IoT Emergency Detection Devices
12 of 37
Relative Importance of Blockchain in Health Care: Enhancing data sharing and mitigating cyber security crimes
13 of 37

A methodology for cyberthreat ranking
14 of 37
Explaining the Relationship between Internet and Democracy in Partly Free Countries Using Machine Learning Models
15 of 37
Social Networks of Technology Caregivers and Caregivees
16 of 37
A Community-based Approach to Co-Managing Privacy and Security in Smart Homes
17 of 37
Understanding Decision-Making Needs of Open Government Data Users
18 of 37

Intrusion Detection System in Smart Home Network Using Artificial Immune System and Extreme Learning Machine Hybrid Approach
19 of 37
Enhancing Physical and Cyber Security of Smart Homes using Co-Monitoring of IoT Devices
20 of 37
Integrating NIST Framework into FAIR model for Quantitative Risk Assessment of Cyber Threats
21 of 37
Finding Actionable Information on Social Media
22 of 37
PREDICTION AND DETECTION OF DEPRESSION USING FOREST TREE ALGORITHM
23 of 37
A LOOK AT EDGELESS HYBRID-CLOUD INFRASTRUCTURE – AN OPTIMIZED SOLUTION FOR MULTI-SITE BACKUP, DISASTER RECOVERY AND HIGH AVAILABILITY
24 of 37
Predicting Future Shooting Crime Locations Using Principles of Data Analytics (SHOPS)
25 of 37
Minimal Criteria: Minimizing User Input and User Interface for Faster Output in Minimalistic Mobile Applications
26 of 37
OPTIMIZING PATIENT-CENTERED MOBILE APPLICATIONS USING DATA MINING TECHNIQUES
27 of 37

An Overview of the next phase of Virtualization
28 of 37

How Society is Racialized in America: A Content Analysis on Sherman Alexie’s The Absolutely True Diary of a Part-Time Indian
29 of 37
Developing Standardized Guidelines for Medical Virtual Reality Training
30 of 37

Donald Shell Interview
31 of 37
Challenges in Intelligent Applications development
32 of 37
Dark Knowledge: A Study on Public Perceptions of the Dark Web
33 of 37
Development of a Database Program and Networking System For Seven Hills Neighborhood Houses
34 of 37
The Pulse of a Nation: A Study on the Cybersecurity Issues Plaguing the Healthcare Industry
35 of 37
Cyber Threats and Security for Small Business
36 of 37

Working with Agency Data to Better Understand Racial Disparities: the Case of Disproportionate Minority Contact with the Juvenile Justice System - Panelist 7 - UC Data Day
37 of 37