{"id":2913,"date":"2025-05-15T06:43:24","date_gmt":"2025-05-15T06:43:24","guid":{"rendered":"https:\/\/renic.es\/agente\/redes-y-servicios-de-telecomunicacion-e-internet\/"},"modified":"2025-06-02T11:28:06","modified_gmt":"2025-06-02T11:28:06","slug":"redes-y-servicios-de-telecomunicacion-e-internet","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/redes-y-servicios-de-telecomunicacion-e-internet\/","title":{"rendered":"Redes y Servicios de Telecomunicaci\u00f3n e Internet"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[477,519,515,603,652,611,582,591,662,526,489,452,579,686,430,598,678,635,715],"area-investigacion-agente":[414,415,423,424,417],"ccaa-agente":[727],"ente-juridico-agente":[757],"tipologia-agente":[],"class_list":["post-2913","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-based-on-behaviour","topics-investigacion-egente-autonomous-risk-detection-and-remediation-through-effective-human-machine-cooperation","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-formal-interoperable-models","topics-investigacion-egente-harvesting-of-information-on-threats","topics-investigacion-egente-integrated-risk-metrics-and-indicators","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-mechanisms-for-data-harvesting","topics-investigacion-egente-network-security","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-risk-quantification","topics-investigacion-egente-search-for-the-origin-of-the-threat","topics-investigacion-egente-security-intelligence","topics-investigacion-egente-security-systems-adapted-to-usage-patterns","topics-investigacion-egente-statistical-and-predictive-risk-analysis","topics-investigacion-egente-system-modelling-and-system-attacks","topics-investigacion-egente-threat-and-attack-simulation","topics-investigacion-egente-user-oriented-security-programmes","topics-investigacion-egente-virtualization-and-network-management","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-promotion-and-awareness-of-safety","area-investigacion-agente-reliable-and-upgradeable-systems","ccaa-agente-comunidad-de-madrid","ente-juridico-agente-universidad-politecnica-de-madrid-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2913"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2913"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2913"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2913"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2913"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}