{"id":12911,"date":"2017-04-07T16:17:27","date_gmt":"2017-04-07T20:17:27","guid":{"rendered":"http:\/\/www.bu.edu\/csmet\/?post_type=profile&#038;p=12911"},"modified":"2018-10-22T13:43:34","modified_gmt":"2018-10-22T17:43:34","slug":"stu-jacobs","status":"publish","type":"profile","link":"https:\/\/www.bu.edu\/csmet\/profile\/stu-jacobs\/","title":{"rendered":"Stu Jacobs"},"content":{"rendered":"<div class=\"bu_collapsible_container \" aria-live=\"polite\" data-customize-animation=\"false\"><h3 class=\"bu_collapsible\" aria-expanded=\"false\"tabindex=\"0\" role=\"button\">Research Interests<\/h3><div class=\"bu_collapsible_section\" style=\"display: none;\"><br style=\"clear: both;\" \/><span><\/span><\/p>\n<ul>\n<li><span>Security Architectures for Wireless and Wired Networks<\/span><\/li>\n<li><span>SS7<\/span><\/li>\n<li><span>CALEA\/LI<\/span><\/li>\n<li><span>Vulnerability Analysis<\/span><\/li>\n<li><span>Intrusion Detection and Systems Engineering Methodologies<\/span><\/li>\n<li><span>Network Design and Security<\/span><\/li>\n<\/ul>\n<p><\/div>\n<\/div>\n\n","protected":false},"author":13337,"template":"","_links":{"self":[{"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/profile\/12911"}],"collection":[{"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/profile"}],"about":[{"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/types\/profile"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/users\/13337"}],"version-history":[{"count":10,"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/profile\/12911\/revisions"}],"predecessor-version":[{"id":14954,"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/profile\/12911\/revisions\/14954"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/csmet\/wp-json\/wp\/v2\/media?parent=12911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}