{"id":2142,"date":"2023-11-27T20:02:37","date_gmt":"2023-11-27T20:02:37","guid":{"rendered":"https:\/\/aicybersecuritycenter.com\/?page_id=2142"},"modified":"2023-11-27T20:03:58","modified_gmt":"2023-11-27T20:03:58","slug":"aicyberinnovate-spectrum-magazine-2023-vol1-iss1","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/aicyberinnovate-spectrum-magazine-2023-vol1-iss1\/","title":{"rendered":"AICyberInnovate Spectrum Magazine-2023-vol1-iss1"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2142\" class=\"elementor elementor-2142\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdaf745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cdaf745\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a6996a\" data-id=\"0a6996a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9e74d9 elementor-widget elementor-widget-heading\" data-id=\"d9e74d9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">AICyberInnovate Spectrum Magazine<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1139bbe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1139bbe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4a4e4a4\" data-id=\"4a4e4a4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c471bec\" data-id=\"c471bec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f74bd1 elementor-widget elementor-widget-heading\" data-id=\"5f74bd1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2023 Volume 1 Issue 1<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c75f2dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c75f2dc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-afa349d\" data-id=\"afa349d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40879ce elementor-widget elementor-widget-heading\" data-id=\"40879ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">1.<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-14ab298\" data-id=\"14ab298\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7201e4 elementor-widget elementor-widget-heading\" data-id=\"c7201e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/CSIM_Revolutionizing-Ticket-Booking.pdf\">Revolutionizing Ticket Booking: The Role of Chatbots in Online Reservations<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1870c1 elementor-widget elementor-widget-heading\" data-id=\"e1870c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Tiwari H. (2023), Revolutionizing Ticket Booking: The Role of Chatbots in Online Reservations,  AICyberInnovate Spectrum Magazine, Volume 1, Issue 1, pp. 1-6<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bdcfde2\" data-id=\"bdcfde2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c56b01 elementor-widget elementor-widget-heading\" data-id=\"1c56b01\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 1-6<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5a5b5e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a5b5e4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c5b0641\" data-id=\"c5b0641\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3939e6 elementor-widget elementor-widget-heading\" data-id=\"c3939e6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">2.<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ee0d13e\" data-id=\"ee0d13e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3a0eba elementor-widget elementor-widget-heading\" data-id=\"f3a0eba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/Smart-Cities-and-IoT-Integration-2.pdf\">Smart Cities and IoT Integration<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa2984c elementor-widget elementor-widget-heading\" data-id=\"fa2984c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As:  Hasan A.  (2023), Smart Cities and IoT Integration,  AICyberInnovate Spectrum Magazine, Volume 1, Issue 1, pp. 7-10<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-12c12ec\" data-id=\"12c12ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7636d32 elementor-widget elementor-widget-heading\" data-id=\"7636d32\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 7-10<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-22bdf04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22bdf04\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-caab7be\" data-id=\"caab7be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-044e61d elementor-widget elementor-widget-heading\" data-id=\"044e61d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">3.<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-52597d5\" data-id=\"52597d5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f55cd9 elementor-widget elementor-widget-heading\" data-id=\"3f55cd9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/Article-9-VADER.pdf\">Understanding Sentiment Analysis with VADER: A Comprehensive Guide<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-baa49bf elementor-widget elementor-widget-heading\" data-id=\"baa49bf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Brijith A. (2023), Understanding Sentiment Analysis with VADER: A Comprehensive Guide,  AICyberInnovate Spectrum Magazine, Volume 1, Issue 1, pp. 11-14<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-26324be\" data-id=\"26324be\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d47b9b elementor-widget elementor-widget-heading\" data-id=\"6d47b9b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 11-14<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5da0e1c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5da0e1c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-91e78bb\" data-id=\"91e78bb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed679c8 elementor-widget elementor-widget-heading\" data-id=\"ed679c8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">4.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-807edf0\" data-id=\"807edf0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15446b3 elementor-widget elementor-widget-heading\" data-id=\"15446b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/Magazine-9-Advanced-Biometrics-scanning-Preventing-from-unwanted-access-in-public-transport-1-5.pdf\">Advanced Biometrics Scanning: Preventing Unwanted Access in Public Transport<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-127c504 elementor-widget elementor-widget-heading\" data-id=\"127c504\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Sahu P.  (2023), Advanced Biometrics Scanning: Preventing Unwanted Access in Public Transport,  AICyberInnovate Spectrum Magazine, Volume 1, Issue 1, pp. 15-19<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-95aa6e6\" data-id=\"95aa6e6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e6c923 elementor-widget elementor-widget-heading\" data-id=\"2e6c923\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 15-19<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d5a7a5c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d5a7a5c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bdfe6cf\" data-id=\"bdfe6cf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd0d38f elementor-widget elementor-widget-heading\" data-id=\"fd0d38f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">5.<\/h5>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-baf74b5\" data-id=\"baf74b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e45946 elementor-widget elementor-widget-heading\" data-id=\"3e45946\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/OSI-Layers-and-Their-Impact-on-Network-Security-1-5.pdf\">OSI Layers and Their Impact on Network Security<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59c8564 elementor-widget elementor-widget-heading\" data-id=\"59c8564\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Reddy K.T.  (2023), OSI Layers and Their Impact on Network Security,  AICyberInnovate Spectrum Magazine, Volume 1, Issue 1, pp. 20-24<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-44e8937\" data-id=\"44e8937\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b0fca9 elementor-widget elementor-widget-heading\" data-id=\"4b0fca9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 7-10<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b3ae379\" data-id=\"b3ae379\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AICyberInnovate Spectrum Magazine 2023 Volume 1 Issue 1 1. Revolutionizing Ticket Booking: The Role of Chatbots in Online Reservations Cite As: Tiwari H. (2023), Revolutionizing Ticket Booking: The Role of Chatbots in Online Reservations, AICyberInnovate Spectrum Magazine, Volume 1, Issue 1, pp. 1-6 pp. 1-6 2. Smart Cities and IoT Integration Cite As: Hasan A.<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/aicyberinnovate-spectrum-magazine-2023-vol1-iss1\/\">Continue reading <span class=\"screen-reader-text\">&#8220;AICyberInnovate Spectrum Magazine-2023-vol1-iss1&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/2142"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=2142"}],"version-history":[{"count":4,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/2142\/revisions"}],"predecessor-version":[{"id":2158,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/2142\/revisions\/2158"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=2142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}