{"id":2814,"date":"2025-05-15T06:43:18","date_gmt":"2025-05-15T06:43:18","guid":{"rendered":"https:\/\/renic.es\/agente\/grupo-de-especial-interes-en-ciberseguridad-sigcybsec\/"},"modified":"2025-05-15T06:43:18","modified_gmt":"2025-05-15T06:43:18","slug":"grupo-de-especial-interes-en-ciberseguridad-sigcybsec","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/grupo-de-especial-interes-en-ciberseguridad-sigcybsec\/","title":{"rendered":"Grupo de Especial Inter\u00e9s en Ciberseguridad (SIGCYBSEC)"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[441,663,438,444,484,493,516,514,497,459,602,565,595,541,605,662,613,526,620,467,671,659,598,594],"area-investigacion-agente":[414,422,415,423,419,417],"ccaa-agente":[719],"ente-juridico-agente":[769],"tipologia-agente":[],"class_list":["post-2814","agente","type-agente","status-publish","hentry","topics-investigacion-egente-audits-of-security-systems","topics-investigacion-egente-big-data-security","topics-investigacion-egente-cloud-and-web-application-architecture","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-cryptography","topics-investigacion-egente-data-mining-en","topics-investigacion-egente-deteccion-y-defensa-ante-ataques-especulativos-de-microarquitectura-en","topics-investigacion-egente-detection-of-malicious-software","topics-investigacion-egente-development-of-automatic-defences","topics-investigacion-egente-forensic-science","topics-investigacion-egente-formal-models-applied-to-cybersecurity","topics-investigacion-egente-ids-ips-firewalls-en","topics-investigacion-egente-improvement-of-security-protocols-and-standards","topics-investigacion-egente-information-filtering","topics-investigacion-egente-network-monitoring-and-security","topics-investigacion-egente-network-security","topics-investigacion-egente-new-types-of-malware","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-secure-execution-platforms","topics-investigacion-egente-secure-multipart-computing","topics-investigacion-egente-security-in-operating-systems","topics-investigacion-egente-system-boot-securization","topics-investigacion-egente-system-modelling-and-system-attacks","topics-investigacion-egente-system-performance-improvement","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-others","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-aragon-en","ente-juridico-agente-universidad-de-zaragoza-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2814"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2814"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2814"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2814"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2814"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}