{"595381":{"#nid":"595381","#data":{"uid":"34540","author":"Kristen Perez","created_gmt":"2017-08-31 19:38:27","changed_gmt":"2017-08-31 19:38:27","title":"cybersecurity_machinelearning","body":[],"image":{"alt":"","view":{"#theme":"field","#title":"Image","#label_display":"hidden","#view_mode":"image_740","#language":"en","#field_name":"field_image","#field_type":"image","#field_translatable":false,"#entity_type":"media","#bundle":"image","#object":{},"#items":{},"#formatter":"image","#is_multiple":false,"#third_party_settings":[],"0":{"#theme":"image_formatter","#item":{},"#item_attributes":[],"#image_style":"large","#url":null,"#cache":{"tags":["config:image.style.large","file:226902"],"contexts":[],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":0},"file":{"fid":"226902","name":"cybersecurity.jpg","path":"\/sites\/default\/files\/images\/cybersecurity.jpg","fullpath":"\/var\/www\/html\/files\/public\/images\/cybersecurity.jpg","mime":"image\/jpeg","size":219807}},"groups":[{"id":"50877","name":"School of Computational Science and Engineering"}],"keywords":[{"id":"76231","name":"Computational Science and Engineering"},{"id":"9167","name":"machine learning"},{"id":"1404","name":"Cybersecurity"}]}}}