{"id":2718,"date":"2025-05-15T06:43:12","date_gmt":"2025-05-15T06:43:12","guid":{"rendered":"https:\/\/renic.es\/agente\/analisis-de-datos-y-ciberseguridad\/"},"modified":"2025-05-30T10:50:07","modified_gmt":"2025-05-30T10:50:07","slug":"analisis-de-datos-y-ciberseguridad","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/analisis-de-datos-y-ciberseguridad\/","title":{"rendered":"An\u00e1lisis de Datos y Ciberseguridad"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[477,437,568,428,663,438,462,473,481,484,493,621,561,494,495,514,502,537,636,515,645,652,611,582,627,429,591,605,662,487,526,452,633,673,669,686,430,532,533,511,426,715],"area-investigacion-agente":[414,422,416,415,423,421,418,424,417],"ccaa-agente":[735],"ente-juridico-agente":[750],"tipologia-agente":[],"class_list":["post-2718","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-based-on-behaviour","topics-investigacion-egente-architecture-of-protection","topics-investigacion-egente-attacker-identification-and-location","topics-investigacion-egente-big-data-analysis-focussed-on-privacy","topics-investigacion-egente-big-data-security","topics-investigacion-egente-cloud-and-web-application-architecture","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-containment-of-attacks","topics-investigacion-egente-creation-of-barriers-to-entry","topics-investigacion-egente-cryptography","topics-investigacion-egente-data-mining-en","topics-investigacion-egente-data-driven-policies","topics-investigacion-egente-decision-making-management-tools","topics-investigacion-egente-decoys-tripwires-en","topics-investigacion-egente-defence-against-viral-attacks","topics-investigacion-egente-detection-of-malicious-software","topics-investigacion-egente-development-of-tool-protection","topics-investigacion-egente-dynamic-evaluation-and-management-of-risks","topics-investigacion-egente-e-mail-protection","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-encryption-protocols-for-preserving-privacy","topics-investigacion-egente-harvesting-of-information-on-threats","topics-investigacion-egente-integrated-risk-metrics-and-indicators","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-iot-privacy","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-mechanisms-for-data-harvesting","topics-investigacion-egente-network-monitoring-and-security","topics-investigacion-egente-network-security","topics-investigacion-egente-post-quantum-encryption","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-search-for-the-origin-of-the-threat","topics-investigacion-egente-secure-processing-of-encrypted-data-and-signals","topics-investigacion-egente-security-in-critical-systems-aeronautics-rail-automotive","topics-investigacion-egente-security-of-mobile-devices","topics-investigacion-egente-security-systems-adapted-to-usage-patterns","topics-investigacion-egente-statistical-and-predictive-risk-analysis","topics-investigacion-egente-strategies-for-reacting-to-attacks","topics-investigacion-egente-study-of-patterns","topics-investigacion-egente-threat-detection","topics-investigacion-egente-usable-public-key-algorithms","topics-investigacion-egente-virtualization-and-network-management","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-interaction-with-the-user-usability","area-investigacion-agente-privacy","area-investigacion-agente-promotion-and-awareness-of-safety","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-pais-vasco-en","ente-juridico-agente-mondragon-unibertsitatea-universidad-de-mondragon-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2718"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2718"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2718"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2718"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2718"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}