{"id":2733,"date":"2025-05-15T06:43:15","date_gmt":"2025-05-15T06:43:15","guid":{"rendered":"https:\/\/renic.es\/agente\/analitica-en-seguridad-y-privacidad\/"},"modified":"2025-05-15T06:43:15","modified_gmt":"2025-05-15T06:43:15","slug":"analitica-en-seguridad-y-privacidad","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/analitica-en-seguridad-y-privacidad\/","title":{"rendered":"Anal\u00edtica en seguridad y privacidad"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[512,568,462,493,657,522,518,501,515,652,569,541,429,609,625,538,700,626,660,579,533,511,712],"area-investigacion-agente":[414,422,416,415,420,418,417],"ccaa-agente":[729],"ente-juridico-agente":[743],"tipologia-agente":[],"class_list":["post-2733","agente","type-agente","status-publish","hentry","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-attacker-identification-and-location","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-data-mining-en","topics-investigacion-egente-data-sanitization-and-anonymization","topics-investigacion-egente-design-of-security-requirements","topics-investigacion-egente-detection-and-monitoring-of-attacks","topics-investigacion-egente-development-of-threat-detection-tools","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-harvesting-of-information-on-threats","topics-investigacion-egente-implementation-of-security-and-privacy-metrics-in-ict","topics-investigacion-egente-information-filtering","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-metrics","topics-investigacion-egente-privacy","topics-investigacion-egente-privacy-assessment-and-metrics","topics-investigacion-egente-privacy-enhancing-technology-pet","topics-investigacion-egente-privacy-in-the-cloud","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-security-intelligence","topics-investigacion-egente-study-of-patterns","topics-investigacion-egente-threat-detection","topics-investigacion-egente-validation-of-metrics","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-metrics","area-investigacion-agente-privacy","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-galicia-en","ente-juridico-agente-gradiant-centro-tecnologico-de-telecomunicaciones-de-galicia-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2733"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2733"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2733"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2733"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2733"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}