{"id":12337,"date":"2021-11-09T21:06:57","date_gmt":"2021-11-10T02:06:57","guid":{"rendered":"https:\/\/carleton.ca\/scs\/?page_id=12337"},"modified":"2021-12-06T19:12:30","modified_gmt":"2021-12-07T00:12:30","slug":"technical-reports-2005","status":"publish","type":"page","link":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/","title":{"rendered":"Technical Reports 2005"},"content":{"rendered":"<table style=\"width: 100%; margin: 0; padding: 0;\">\n<tbody>\n<tr style=\"background-color: #f5e1e1;\">\n<td style=\"font-weight: bold;\" colspan=\"4\">Technical Reports 2005<\/td>\n<td style=\"margin: 0; padding: 15px 0 0 0;\"><p><select id=\"TechReportYear\" style=\"font-size: 1em;\" onchange=\"var url = $(this).val(); window.location = url;\"><option selected=\"selected\" value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1982\/\">Select Year<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1982\/\">Tech Reports 1982<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1983\/\">Tech Reports 1983<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1984\/\">Tech Reports 1984<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1985\/\">Tech Reports 1985<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1986\/\">Tech Reports 1986<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1987\/\">Tech Reports 1987<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1988\/\">Tech Reports 1988<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1989\/\">Tech Reports 1989<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1990\/\">Tech Reports 1990<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1991\/\">Tech Reports 1991<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1992\/\">Tech Reports 1992<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1993\/\">Tech Reports 1993<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1994\/\">Tech Reports 1994<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1995\/\">Tech Reports 1995<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1996\/\">Tech Reports 1996<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1997\/\">Tech Reports 1997<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1998\/\">Tech Reports 1998<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-1999\/\">Tech Reports 1999<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2000\/\">Tech Reports 2000<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2001\/\">Tech Reports 2001<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2002\/\">Tech Reports 2002<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2003\/\">Tech Reports 2003<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2004\/\">Tech Reports 2004<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\">Tech Reports 2005<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2006\/\">Tech Reports 2006<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2007\/\">Tech Reports 2007<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2008\/\">Tech Reports 2008<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2009\/\">Tech Reports 2009<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2010\/\">Tech Reports 2010<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2011\/\">Tech Reports 2011<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2012\/\">Tech Reports 2012<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2013\/\">Tech Reports 2013<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2014\/\">Tech Reports 2014<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2015\/\">Tech Reports 2015<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2016\/\">Tech Reports 2016<\/option><option value=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2017\/\">Tech Reports 2017<\/option><\/select><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 15%;\"><strong>Number<\/strong><\/td>\n<td style=\"width: 25%;\"><strong>Title<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Authors<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Date<\/strong><\/td>\n<td style=\"width: 20%;\"><strong>Download<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-01<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-01-anomaly-based-intrusion-detection-using-mobility-profiles-of-public-transportation-users\/\">Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">January 3, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-01.pdf\">TR-05-01.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-02<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-02-arp-based-detection-of-scanning-worms-within-an-enterprise-network\/\">ARP-based Detection of Scanning Worms Within an Enterprise Network<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">David Whyte, P.C. Van Oorschot, Evangelos Kranakis<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">February 1, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-02.pdf\">TR-05-02.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-03<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-03-a-new-approach-for-solving-the-maximum-clique-problem\/\">A New Approach for Solving the Maximum Clique Problem<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Peter J. Taillon<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">April 15, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-03.pdf\">TR-05-03.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-04<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-04-improving-k-vertex-cover-algorithms-for-graphs-of-small-bounded-degree\/\">Improving k-Vertex Cover Algorithms for Graphs of Small Bounded Degree<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Peter J. Taillon<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">April 20, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-04.pdf\">TR-05-04.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-05<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-05-distributed-dynamic-storage-in-wireless-networks\/\">Distributed Dynamic Storage in Wireless Networks<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Constantinos Georgiou, Evangelos Kranakis, Ricardo Marcelin-Jimenez, Sergio Rajsbaum, Jorge Urrutia<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">May 3, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-05.pdf\">TR-05-05.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-06<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-06-addressing-malicious-smtp-based-mass-mailing-activity-within-an-enterprise-network\/\">Addressing Malicious SMTP-based Mass-Mailing Activity Within an Enterprise Network<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">David Whyte, P.C. Van Oorschot, Evangelos Kranakis<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">May 24, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-06.pdf\">TR-05-06.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-07<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-07-a-selective-introduction-to-border-gateway-protocol-bgp-security-issues\/\">A Selective Introduction to Border Gateway Protocol (BGP) Security Issues<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Tao Wan, P.C. Van Oorschot, Evangelos Kranakis<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">August 1, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-07.pdf\">TR-05-07.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-08<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-08-on-inter-domain-routing-security-and-pretty-secure-bgp-psbgp\/\">On Inter-domain Routing Security and Pretty Secure BGP (psBGP)<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Evangelos Kranakis, P.C. Van Oorschot, Tao Wan<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">September 20, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-08.pdf\">TR-05-08.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-09<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-09-analysis-of-bgp-prefix-origins-during-googles-may-2005-outage\/\">Analysis of BGP Prefix Origins During Google&#8217;s May 2005 Outage<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Tao Wan &amp; P.C. Van Oorschot<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">\n<div class=\"tr_t3\">November 15, 2005<\/div>\n<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-09.pdf\">TR-05-09.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-10<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-10-connectivity-preserving-transformations-of-binary-images\/\">Connectivity &#8211; Preserving Transformations of Binary Images<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">Prosenjit Bose, Vida Dujmovic, Ferran Hurtado, Pat Morin<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">November 24, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-10.pdf\">TR-05-10.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-11<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-11-on-the-security-of-graphical-password-schemes\/\">On the Security of Graphical Password Schemes<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\">\n<div class=\"tr_t3\">P.C. Van Oorschot &amp; Julie Thorpe<\/div>\n<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">December 21, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-11.pdf\">TR-05-11.pdf<\/a><\/td>\n<\/tr>\n<tr>\n<td>\n<div class=\"tr_t1\">TR-05-12<\/div>\n<\/td>\n<td>\n<div class=\"tr_t1\"><a href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/tr-05-12-on-identity-theft-and-a-countermeasure-based-on-digital-uniqueness-and-location-cross-checking\/\">On Identity Theft and a Countermeasure based on Digital Uniqueness and Location Cross-Checking<\/a><\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">P.C. Van Oorschot &amp; Stuart G. Stubblebine<\/div>\n<\/td>\n<td>\n<div class=\"tr_t3\">December 22, 2005<\/div>\n<\/td>\n<td><a href=\"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/TR-05-12.pdf\">TR-05-12.pdf<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Technical Reports 2005 Number Title Authors Date Download TR-05-01 Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation Users Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis January 3, 2005 TR-05-01.pdf TR-05-02 ARP-based Detection of Scanning Worms Within an Enterprise Network David Whyte, P.C. Van Oorschot, Evangelos Kranakis February 1, 2005 TR-05-02.pdf TR-05-03 A New Approach for [&hellip;]<\/p>\n","protected":false},"author":49,"featured_media":0,"parent":11593,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technical Reports 2005 - School of Computer Science<\/title>\n<meta name=\"description\" content=\"Technical Reports 2005 Number Title Authors Date Download TR-05-01 Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\",\"url\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\",\"name\":\"Technical Reports 2005 - School of Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/scs\/#website\"},\"datePublished\":\"2021-11-10T02:06:57+00:00\",\"dateModified\":\"2021-12-07T00:12:30+00:00\",\"description\":\"Technical Reports 2005 Number Title Authors Date Download TR-05-01 Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/scs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SCS Technical Reports\",\"item\":\"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Technical Reports 2005\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/scs\/#website\",\"url\":\"https:\/\/carleton.ca\/scs\/\",\"name\":\"School of Computer Science\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/scs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technical Reports 2005 - School of Computer Science","description":"Technical Reports 2005 Number Title Authors Date Download TR-05-01 Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/","url":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/","name":"Technical Reports 2005 - School of Computer Science","isPartOf":{"@id":"https:\/\/carleton.ca\/scs\/#website"},"datePublished":"2021-11-10T02:06:57+00:00","dateModified":"2021-12-07T00:12:30+00:00","description":"Technical Reports 2005 Number Title Authors Date Download TR-05-01 Anomaly-based Intrusion Detection Using Mobility Profiles of Public Transportation","breadcrumb":{"@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/technical-reports-2005\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/scs\/"},{"@type":"ListItem","position":2,"name":"Research","item":"https:\/\/carleton.ca\/scs\/research\/"},{"@type":"ListItem","position":3,"name":"SCS Technical Reports","item":"https:\/\/carleton.ca\/scs\/research\/scs-technical-reports\/"},{"@type":"ListItem","position":4,"name":"Technical Reports 2005"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/scs\/#website","url":"https:\/\/carleton.ca\/scs\/","name":"School of Computer Science","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/scs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_uploaded_image":{"ID":8983,"id":8983,"title":"Coding screen","filename":"laptop-code-1600.jpg","filesize":154356,"url":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","link":"https:\/\/carleton.ca\/scs\/tech-support\/laptop-code-1600\/","alt":"Coding screen","author":"7","description":"Coding screen","caption":"","name":"laptop-code-1600","status":"inherit","uploaded_to":6535,"date":"2021-02-10 15:47:55","modified":"2021-11-25 20:57:39","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/carleton.ca\/scs\/wp\/wp-includes\/images\/media\/default.png","width":1600,"height":700,"sizes":{"thumbnail":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-160x70.jpg","thumbnail-width":160,"thumbnail-height":70,"medium":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-240x105.jpg","medium-width":240,"medium-height":105,"medium_large":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-768x336.jpg","medium_large-width":768,"medium_large-height":336,"large":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-400x175.jpg","large-width":400,"large-height":175,"gallery-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-300x230.jpg","gallery-thumb-width":300,"gallery-thumb-height":230,"1536x1536":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-1536x672.jpg","1536x1536-width":1536,"1536x1536-height":672,"2048x2048":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","2048x2048-width":1600,"2048x2048-height":700,"banner":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600.jpg","banner-width":1600,"banner-height":700,"people":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-200x200.jpg","people-width":200,"people-height":200,"post-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-300x230.jpg","post-thumb-width":300,"post-thumb-height":230,"rotator-image":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-800x600.jpg","rotator-image-width":800,"rotator-image-height":600,"video-thumb":"https:\/\/carleton.ca\/scs\/wp-content\/uploads\/laptop-code-1600-360x158.jpg","video-thumb-width":360,"video-thumb-height":158}},"banner_image_type":"upload","banner_button":"no","banner_opacity":"dark"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12337"}],"collection":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/comments?post=12337"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12337\/revisions"}],"predecessor-version":[{"id":13155,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/12337\/revisions\/13155"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/pages\/11593"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/scs\/wp-json\/wp\/v2\/media?parent=12337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}