{"id":2799,"date":"2025-05-15T06:43:18","date_gmt":"2025-05-15T06:43:18","guid":{"rendered":"https:\/\/renic.es\/agente\/dpto-de-informatica-de-sistemas-y-computadores-disca\/"},"modified":"2025-06-02T08:01:31","modified_gmt":"2025-06-02T08:01:31","slug":"dpto-de-informatica-de-sistemas-y-computadores-disca","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/dpto-de-informatica-de-sistemas-y-computadores-disca\/","title":{"rendered":"Dpto. de Inform\u00e1tica de Sistemas y Computadores (DISCA)"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[708,443,465,685,514,497,505,502,537,653,432,459,652,582,596,662,613,689,634,673,671,598,509],"area-investigacion-agente":[414,422,416,415,423,419,424,417],"ccaa-agente":[726],"ente-juridico-agente":[758],"tipologia-agente":[],"class_list":["post-2799","agente","type-agente","status-publish","hentry","topics-investigacion-egente-binary-security-techniques","topics-investigacion-egente-biometric-authentication","topics-investigacion-egente-computation-of-relevant-metadata","topics-investigacion-egente-dedicated-systems","topics-investigacion-egente-detection-of-malicious-software","topics-investigacion-egente-development-of-automatic-defences","topics-investigacion-egente-development-of-methodologies-for-increased-reliability-and-updating-of-systems","topics-investigacion-egente-development-of-tool-protection","topics-investigacion-egente-dynamic-evaluation-and-management-of-risks","topics-investigacion-egente-facial-recognition","topics-investigacion-egente-forensic-analysis-in-the-iot","topics-investigacion-egente-forensic-science","topics-investigacion-egente-harvesting-of-information-on-threats","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-methodology-for-the-adoption-of-best-practice-and-reduction-of-barriers-in-relation-to-risks","topics-investigacion-egente-network-security","topics-investigacion-egente-new-types-of-malware","topics-investigacion-egente-operating-systems","topics-investigacion-egente-secure-data-processing","topics-investigacion-egente-security-in-critical-systems-aeronautics-rail-automotive","topics-investigacion-egente-security-in-operating-systems","topics-investigacion-egente-system-modelling-and-system-attacks","topics-investigacion-egente-vulnerability-discovery-and-analysis","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-others","area-investigacion-agente-promotion-and-awareness-of-safety","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-comunidad-valenciana-en","ente-juridico-agente-universidad-politecnica-de-valencia-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2799"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2799"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2799"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2799"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2799"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}