{"id":2952,"date":"2025-05-15T06:43:27","date_gmt":"2025-05-15T06:43:27","guid":{"rendered":"https:\/\/renic.es\/agente\/vicomtech-v5-seguridad-digital\/"},"modified":"2025-06-02T11:56:58","modified_gmt":"2025-06-02T11:56:58","slug":"vicomtech-v5-seguridad-digital","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/vicomtech-v5-seguridad-digital\/","title":{"rendered":"Vicomtech V5 &#8211; Seguridad Digital"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,477,512,443,495,518,497,501,537,623,653,580,604,526,549,686,533,598,702,678,716],"area-investigacion-agente":[414,415,423,421],"ccaa-agente":[735],"ente-juridico-agente":[775],"tipologia-agente":[],"class_list":["post-2952","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-access-control-based-on-behaviour","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-biometric-authentication","topics-investigacion-egente-defence-against-viral-attacks","topics-investigacion-egente-detection-and-monitoring-of-attacks","topics-investigacion-egente-development-of-automatic-defences","topics-investigacion-egente-development-of-threat-detection-tools","topics-investigacion-egente-dynamic-evaluation-and-management-of-risks","topics-investigacion-egente-empowering-user-capabilities","topics-investigacion-egente-facial-recognition","topics-investigacion-egente-human-system-interaction","topics-investigacion-egente-monitoring-and-profiling","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-reliable-global-level-identity-generation","topics-investigacion-egente-security-systems-adapted-to-usage-patterns","topics-investigacion-egente-study-of-patterns","topics-investigacion-egente-system-modelling-and-system-attacks","topics-investigacion-egente-technologies-to-reduce-misbehaviour-by-users","topics-investigacion-egente-threat-and-attack-simulation","topics-investigacion-egente-visualisation-of-techniques-to-facilitate-intelligibility","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-interaction-with-the-user-usability","ccaa-agente-pais-vasco-en","ente-juridico-agente-vicomtech-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2952"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2952"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2952"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2952"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2952"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}