{"id":2794,"date":"2025-05-15T06:43:18","date_gmt":"2025-05-15T06:43:18","guid":{"rendered":"https:\/\/renic.es\/agente\/data-centric-computing-research-hub\/"},"modified":"2025-06-02T07:54:55","modified_gmt":"2025-06-02T07:54:55","slug":"data-centric-computing-research-hub","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/data-centric-computing-research-hub\/","title":{"rendered":"Data-Centric Computing Research Hub"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[512,441,637,561,503,501,552,537,558,661,565,672,582,429,605,662,451,701,638,489,557,579,669,598,513],"area-investigacion-agente":[414,422,416,415,419,418],"ccaa-agente":[718],"ente-juridico-agente":[767],"tipologia-agente":[],"class_list":["post-2794","agente","type-agente","status-publish","hentry","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-audits-of-security-systems","topics-investigacion-egente-data-protection-confidentiality","topics-investigacion-egente-decision-making-management-tools","topics-investigacion-egente-development-of-specific-languages-for-data-treatment","topics-investigacion-egente-development-of-threat-detection-tools","topics-investigacion-egente-digital-rights-management","topics-investigacion-egente-dynamic-evaluation-and-management-of-risks","topics-investigacion-egente-hardware-for-biometrics-and-cryptography","topics-investigacion-egente-hardware-security","topics-investigacion-egente-ids-ips-firewalls-en","topics-investigacion-egente-information-network-security","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-network-monitoring-and-security","topics-investigacion-egente-network-security","topics-investigacion-egente-privacy-best-practices","topics-investigacion-egente-privacy-aware-security-technologies","topics-investigacion-egente-proteccion-de-datos-integridad-y-disponibilidad-en","topics-investigacion-egente-risk-quantification","topics-investigacion-egente-security-governance-and-management","topics-investigacion-egente-security-intelligence","topics-investigacion-egente-security-of-mobile-devices","topics-investigacion-egente-system-modelling-and-system-attacks","topics-investigacion-egente-utility-information-detection","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-others","area-investigacion-agente-privacy","ccaa-agente-andalucia-en","ente-juridico-agente-universidad-de-sevilla-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2794"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2794"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2794"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2794"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2794"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}