{"id":706,"date":"2020-09-09T07:51:02","date_gmt":"2020-09-09T07:51:02","guid":{"rendered":"http:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy.pdf"},"modified":"2020-09-09T07:51:20","modified_gmt":"2020-09-09T07:51:20","slug":"a-data-analytics-approach-to-the-cybercrime-underground-economy","status":"inherit","type":"attachment","link":"https:\/\/ijrdase.com\/ijrdase\/a-data-analytics-approach-to-the-cybercrime-underground-economy\/","title":{"rendered":"A Data Analytics Approach to the Cybercrime Underground Economy"},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-706","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy.pdf'><img loading=\"lazy\" decoding=\"async\" width=\"232\" height=\"300\" src=\"https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-232x300.jpg\" class=\"attachment-medium size-medium\" alt=\"\" \/><\/a><\/p>\n<p>A Data Analytics Approach to the Cybercrime Underground Economy<\/p>\n"},"caption":{"rendered":"<p>A Data Analytics Approach to the Cybercrime Underground Economy<\/p>\n"},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{"sizes":{"thumbnail":{"file":"A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-116x150.jpg","width":116,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-116x150.jpg"},"medium":{"file":"A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-232x300.jpg","width":232,"height":300,"mime_type":"image\/jpeg","source_url":"https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-232x300.jpg"},"large":{"file":"A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-791x1024.jpg","width":791,"height":1024,"mime_type":"image\/jpeg","source_url":"https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf-791x1024.jpg"},"full":{"file":"A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf.jpg","width":1088,"height":1408,"mime_type":"application\/pdf","source_url":"https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy-pdf.jpg"}}},"post":null,"source_url":"https:\/\/ijrdase.com\/ijrdase\/wp-content\/uploads\/2020\/09\/A-Data-Analytics-Approach-to-the-Cybercrime-Underground-Economy.pdf","_links":{"self":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/media\/706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ijrdase.com\/ijrdase\/wp-json\/wp\/v2\/comments?post=706"}]}}