{"id":2903,"date":"2025-05-15T06:43:24","date_gmt":"2025-05-15T06:43:24","guid":{"rendered":"https:\/\/renic.es\/agente\/nics-lab-networks-information-and-computer-security-lab\/"},"modified":"2025-06-02T11:17:35","modified_gmt":"2025-06-02T11:17:35","slug":"nics-lab-networks-information-and-computer-security-lab","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/nics-lab-networks-information-and-computer-security-lab\/","title":{"rendered":"NICS Lab. Networks, Information and Computer Security Lab"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,512,437,445,647,664,462,444,484,667,522,518,517,499,502,665,645,714,546,668,582,627,608,605,662,700,628,654,466,586,620,467,660,673,666,471,691,511],"area-investigacion-agente":[414,422,423,419,418,417],"ccaa-agente":[718],"ente-juridico-agente":[765],"tipologia-agente":[],"class_list":["post-2903","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-architecture-of-protection","topics-investigacion-egente-authentication-of-transactions-at-global-level","topics-investigacion-egente-authentication-protocols","topics-investigacion-egente-blockchain-security","topics-investigacion-egente-cloud-computing-en","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-cryptography","topics-investigacion-egente-cyber-physical-systems-security","topics-investigacion-egente-design-of-security-requirements","topics-investigacion-egente-detection-and-monitoring-of-attacks","topics-investigacion-egente-detection-and-removal-of-malware","topics-investigacion-egente-development-of-integrated-security-environments","topics-investigacion-egente-development-of-tool-protection","topics-investigacion-egente-digital-twins-security","topics-investigacion-egente-encryption-protocols-for-preserving-privacy","topics-investigacion-egente-environment-supervision","topics-investigacion-egente-fog-computing-en","topics-investigacion-egente-intelligent-transport-systems-security","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-iot-privacy","topics-investigacion-egente-methods-and-development-of-protection-tools","topics-investigacion-egente-network-monitoring-and-security","topics-investigacion-egente-network-security","topics-investigacion-egente-privacy-enhancing-technology-pet","topics-investigacion-egente-privacy-of-consultations","topics-investigacion-egente-private-communication-networks","topics-investigacion-egente-secure-computing","topics-investigacion-egente-secure-development-languages-and-frameworks","topics-investigacion-egente-secure-execution-platforms","topics-investigacion-egente-secure-multipart-computing","topics-investigacion-egente-security-privacy-through-design","topics-investigacion-egente-security-in-critical-systems-aeronautics-rail-automotive","topics-investigacion-egente-security-in-industry-4-0","topics-investigacion-egente-situational-awareness","topics-investigacion-egente-smart-cards-en","topics-investigacion-egente-threat-detection","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-critical-infrastructures","area-investigacion-agente-identity-management","area-investigacion-agente-others","area-investigacion-agente-privacy","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-andalucia-en","ente-juridico-agente-universidad-de-malaga-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2903"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2903"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2903"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2903"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2903"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}