{"id":2156,"date":"2023-11-27T20:56:12","date_gmt":"2023-11-27T20:56:12","guid":{"rendered":"https:\/\/aicybersecuritycenter.com\/?page_id=2156"},"modified":"2023-11-27T21:01:59","modified_gmt":"2023-11-27T21:01:59","slug":"aicyberinnovate-spectrum-magazine-2023-vol-1-issue-2","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/aicyberinnovate-spectrum-magazine-2023-vol-1-issue-2\/","title":{"rendered":"AICyberInnovate Spectrum Magazine 2023 Vol 1 issue 2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2156\" class=\"elementor elementor-2156\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca20d21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca20d21\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1dd78c\" data-id=\"c1dd78c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c60638 elementor-widget elementor-widget-heading\" data-id=\"7c60638\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">AICyberInnovate Spectrum Magazine<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c824508 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c824508\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-0a28462\" data-id=\"0a28462\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5f2a0aa\" data-id=\"5f2a0aa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ecf184 elementor-widget elementor-widget-heading\" data-id=\"6ecf184\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2023 Volume 1 Issue 2<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3c9bf2d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c9bf2d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f1bd570\" data-id=\"f1bd570\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2de83a9 elementor-widget elementor-widget-heading\" data-id=\"2de83a9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">1.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-69ac7dd\" data-id=\"69ac7dd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09af5e4 elementor-widget elementor-widget-heading\" data-id=\"09af5e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/Safeguarding-against-DoS-and-DDoS-attacks-in-modern-network-1-5.pdf\">Safeguarding Against DoS and DDoS Attacks in Modern Networks<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44a5470 elementor-widget elementor-widget-heading\" data-id=\"44a5470\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Reddy K.T.  (2023) Safeguarding Against DoS and DDoS Attacks in Modern Networks, AICyberInnovate Spectrum Magazine, Volume 1, Issue 02, pp. 1-4<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c2f585f\" data-id=\"c2f585f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3165498 elementor-widget elementor-widget-heading\" data-id=\"3165498\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 1-4<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6d9c649 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d9c649\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bbc799d\" data-id=\"bbc799d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a180d2 elementor-widget elementor-widget-heading\" data-id=\"8a180d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">2.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-bb9a700\" data-id=\"bb9a700\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8777980 elementor-widget elementor-widget-heading\" data-id=\"8777980\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/Article-6-Biometrics-temp.pdf\">AI and Biometrics:\nA New Era of Security Authentication<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d75112e elementor-widget elementor-widget-heading\" data-id=\"d75112e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Brijith A.  (2023) AI and Biometrics:\nA New Era of Security Authentication, AICyberInnovate Spectrum Magazine, Volume 1, Issue 02, pp. 5-10<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3cd8e1f\" data-id=\"3cd8e1f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dab38b4 elementor-widget elementor-widget-heading\" data-id=\"dab38b4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 5-10<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-618ce57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"618ce57\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7955648\" data-id=\"7955648\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d9694e elementor-widget elementor-widget-heading\" data-id=\"5d9694e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">3.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c87a2a5\" data-id=\"c87a2a5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e98427f elementor-widget elementor-widget-heading\" data-id=\"e98427f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/CISM_Power-of-Open-Source-Mail-Servers-.pdf\">Exploring the Power of Open Source Mail Servers: A Comprehensive Guide<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8018b elementor-widget elementor-widget-heading\" data-id=\"4a8018b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Tiwari H.  (2023) Exploring the Power of Open Source Mail Servers: A Comprehensive Guide, AICyberInnovate Spectrum Magazine, Volume 1, Issue 02, pp. 11-16<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5464d45\" data-id=\"5464d45\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e436a53 elementor-widget elementor-widget-heading\" data-id=\"e436a53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 11-16<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-eca2d5b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eca2d5b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a7fc352\" data-id=\"a7fc352\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a079e58 elementor-widget elementor-widget-heading\" data-id=\"a079e58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">4.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a0caa58\" data-id=\"a0caa58\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bb5a948 elementor-widget elementor-widget-heading\" data-id=\"bb5a948\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/Magazine-Article-5-Optical-Camoflauge-1-4.pdf\">Optical Camouflage and Its Implications on Cybersecurity: Prevention and Mitigation Strategies<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da5040b elementor-widget elementor-widget-heading\" data-id=\"da5040b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Sahu P. (2023) Optical Camouflage and Its Implications on Cybersecurity: Prevention and Mitigation Strategies, AICyberInnovate Spectrum Magazine, Volume 1, Issue 02, pp. 17-20<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5ea02eb\" data-id=\"5ea02eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e91baa7 elementor-widget elementor-widget-heading\" data-id=\"e91baa7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 17-20<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3321fda elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3321fda\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-e91d334\" data-id=\"e91d334\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d09c61 elementor-widget elementor-widget-heading\" data-id=\"0d09c61\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">5.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8c55d5c\" data-id=\"8c55d5c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8badd5c elementor-widget elementor-widget-heading\" data-id=\"8badd5c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/aicybersecuritycenter.com\/wp-content\/uploads\/2023\/11\/AR-for-Industrial-Applications-Improving-Workforce-Efficiency.pdf\">AR for Industrial Applications: Improving Workforce Efficiency<\/a><\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-225792a elementor-widget elementor-widget-heading\" data-id=\"225792a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cite As: Hasan A. (2023) AR for Industrial Applications: Improving Workforce Efficiency, AICyberInnovate Spectrum Magazine, Volume 1, Issue 02, pp. 21-24<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-70f965d\" data-id=\"70f965d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a85fcb elementor-widget elementor-widget-heading\" data-id=\"1a85fcb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">pp. 21-24<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8ea6886\" data-id=\"8ea6886\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AICyberInnovate Spectrum Magazine 2023 Volume 1 Issue 2 1. Safeguarding Against DoS and DDoS Attacks in Modern Networks Cite As: Reddy K.T. (2023) Safeguarding Against DoS and DDoS Attacks in Modern Networks, AICyberInnovate Spectrum Magazine, Volume 1, Issue 02, pp. 1-4 pp. 1-4 2. AI and Biometrics: A New Era of Security Authentication Cite As:<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/aicyberinnovate-spectrum-magazine-2023-vol-1-issue-2\/\">Continue reading <span class=\"screen-reader-text\">&#8220;AICyberInnovate Spectrum Magazine 2023 Vol 1 issue 2&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/2156"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=2156"}],"version-history":[{"count":7,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/2156\/revisions"}],"predecessor-version":[{"id":2170,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/2156\/revisions\/2170"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=2156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}