{"id":60,"date":"2022-10-11T11:27:40","date_gmt":"2022-10-11T09:27:40","guid":{"rendered":"http:\/\/ai4cyber.eu\/?page_id=60"},"modified":"2025-09-09T09:45:54","modified_gmt":"2025-09-09T07:45:54","slug":"publications","status":"publish","type":"page","link":"https:\/\/ai4cyber.eu\/?page_id=60","title":{"rendered":"Publications"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;gcid-39d1a4c8-7304-4457-be6e-1aa5f42abbee&#8221; background_color_gradient_end=&#8221;#f43350&#8243; custom_margin=&#8221;-20px||-20px||true|false&#8221; global_colors_info=&#8221;{%22gcid-39d1a4c8-7304-4457-be6e-1aa5f42abbee%22:%91%22background_color%22%93}&#8221;][et_pb_row _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;30px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>RESEARCH PAPERS<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;TablePublications&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|700|||||||&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;]<!-- \u2013 DUPLICAR CODIGO INFERIOR Y CAMBIAR CONTENIDO EN TD\n\n\n<td style=\"width: 203px; height: 95px;\">Authors names<\/td>\n\n\n\n\n<td style=\"width: 311px; height: 95px;\"><a href=\"\">NamePublication<\/a>.<\/td>\n\n\n\u2013--><br \/>\n<!-- \u2013 FIN DUPLICAR CODIGO SUPERIOR Y CAMBIAR CONTENIDO EN TD \u2013--><\/p>\n<table id=\"myTable\" class=\" alignleft\" style=\"height: 2755px; width: 854px;\">\n<tbody>\n<tr style=\"height: 23px;\">\n<th style=\"width: 381.707px; height: 23px;\">Publication Date<\/th>\n<th style=\"width: 225.145px; height: 23px;\">Title<\/th>\n<th style=\"width: 381.707px; height: 23px;\">Authors<\/th>\n<th style=\"width: 381.707px; height: 23px;\">Partners<\/th>\n<th style=\"width: 225.976px; height: 23px;\">Conference\/Journal<\/th>\n<\/tr>\n<tr style=\"height: 95px;\">\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.145px; height: 95px;\"><a href=\"https:\/\/www.researchgate.net\/publication\/372321539_Study_on_Adversarial_Attacks_Techniques_Learning_Methods_and_Countermeasures_Application_to_Anomaly_Detection\">Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures &#8211; Application to Anomaly Detection<\/a>.<\/td>\n<td style=\"width: 381.707px; height: 95px;\">Anis Bouaziz, Manh-Dung Nguyen, Valeria Vald\u00e8s, Ana Rosa Cavalli and Wissam Mallouli<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.976px; height: 95px;\">ICSOFT 2023 &#8211; 18th International Conference on Software Technologies<\/a><\/td>\n<\/tr>\n<tr style=\"height: 71px;\">\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.145px; height: 71px;\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-41630-9_5\">Interpreting Intrusions &#8211; The Role of Explainability in AI-based Intrusion Detection Systems<\/a><\/td>\n<td style=\"width: 381.707px; height: 71px;\">Marek Pawlicki, Aleksandra Pawlicka, M\u015bcis\u0142a\u1e83 \u015arutek, Rafal Kozik, Michal Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.976px; height: 71px;\">CORES 2023, IP&amp;C 2023:\u00a0Progress on Pattern Classification, Image Processing and Communications<\/a>\u00a0pp 45\u201353<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<\/tr>\n<tr style=\"height: 71px;\">\n<td style=\"width: 381.707px; height: 71px;\"><\/td>\n<td style=\"width: 225.145px; height: 71px;\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-99-4752-2_26\">Explainable Artificial Intelligence 101: Techniques, Applications and Challenges<\/a><\/td>\n<td style=\"width: 381.707px; height: 71px;\">Wiktor Kurek, Marek Pawlicki, Aleksandra Pawlicka, Rafa\u0142 Kozik &amp; Micha\u0142 Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 71px;\"><\/td>\n<td style=\"width: 225.976px; height: 71px;\">ICIC 2023:\u00a0Advanced Intelligent Computing Technology and Applications<\/a>\u00a0pp 310\u2013318<\/td>\n<\/tr>\n<tr style=\"height: 71px;\">\n<td style=\"width: 381.707px; height: 71px;\"><\/td>\n<td style=\"width: 225.145px; height: 71px;\"><a href=\"https:\/\/www.researchgate.net\/publication\/375433671_Towards_Quality_Measures_for_xAI_algorithms_Explanation_Stability\"> Towards Quality Measures for xAI algorithms: Explanation Stability<\/a><\/td>\n<td style=\"width: 381.707px; height: 71px;\">Marek Pawlicki<\/td>\n<td style=\"width: 381.707px; height: 71px;\"><\/td>\n<td style=\"width: 225.976px; height: 71px;\">2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA)<\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 381.707px; height: 119px;\"><\/td>\n<td style=\"width: 225.145px; height: 119px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10205591\">Detection of Physical Adversarial Attacks on Traffic Signs for Autonomous Vehicles<\/a><\/td>\n<td style=\"width: 381.707px; height: 119px;\">Barbara Villarini, Panagiotis Radoglou-Grammatikis, Thomas Lagkas, Panagiotis Sarigiannidis and Vasileios Argyriou<\/td>\n<td style=\"width: 381.707px; height: 119px;\"><\/td>\n<td style=\"width: 225.976px; height: 119px;\">2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)<\/a><\/td>\n<\/tr>\n<tr style=\"height: 142px;\">\n<td style=\"width: 381.707px; height: 142px;\"><\/td>\n<td style=\"width: 225.145px; height: 142px;\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605163\">Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems<\/a><\/td>\n<td style=\"width: 381.707px; height: 142px;\">Dimitrios Christos Asimopoulos, Panagiotis Radoglou-Grammatikis, Ioannis Makris, Valeri Mladenov, Konstantinos E. Psannis, Sotirios Goudos and Panagiotis Sarigiannidis<\/td>\n<td style=\"width: 381.707px; height: 142px;\"><\/td>\n<td style=\"width: 225.976px; height: 142px;\"><span class=\"epub-section__title\">ARES &#8217;23: Proceedings of the 18th International Conference on Availability, Reliability and Security<\/a><\/span><\/td>\n<\/tr>\n<tr style=\"height: 119px;\">\n<td style=\"width: 381.707px; height: 119px;\"><\/td>\n<td style=\"width: 225.145px; height: 119px;\"><a href=\"https:\/\/www.mdpi.com\/2076-3417\/13\/18\/10072\">Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM Communication<\/a><\/td>\n<td style=\"width: 381.707px; height: 119px;\">Stylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Ricardo Cabecinha, Theofanis Fotis<\/td>\n<td style=\"width: 381.707px; height: 119px;\"><\/td>\n<td style=\"width: 225.976px; height: 119px;\"><span class=\"epub-section__title\">eHealth Innovative Approaches and Applications Special Issue<\/a><\/span><\/td>\n<\/tr>\n<tr style=\"height: 95px;\">\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.145px; height: 95px;\"><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3600160.3605051\">Artificial Intelligence for next generation cybersecurity: The AI4CYBER framework<\/a>.<\/td>\n<td style=\"width: 381.707px; height: 95px;\">Iturbe, Eider; Rios, Erkuden; Rego, Angel; Toledo, Nerea<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.976px; height: 95px;\">ARES &#8217;23: &#8211; Proceedings of the 18th International Conference on Availability, Reliability and Security<\/a><\/td>\n<\/tr>\n<tr style=\"height: 95px;\">\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.145px; height: 95px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10411699\">The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.<\/a><\/td>\n<td style=\"width: 381.707px; height: 95px;\">Aleksandra Pawlicka, Marek Pawlicki, Rafa\u0142 Kozik , Micha\u0142 Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.976px; height: 95px;\">LegalAI@ICDM2023 &#8211; <a href=\"https:\/\/legalai2023.github.io\/\">The 2ndInternational Workshop on Legal Intelligence Held in conjunction with ICDM 2023<\/a><\/td>\n<\/tr>\n<tr style=\"height: 95px;\">\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.145px; height: 95px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10475824\">Towards trustworthy Artificial Intelligence: Security risk assessment methodology for Artificial Intelligence systems.<\/a><\/td>\n<td style=\"width: 381.707px; height: 95px;\">Eider Iturbe, Erkuden Rios, Nerea Toledo<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.976px; height: 95px;\">CloudCom 2023 &#8211; International Conference on Cloud Computing Technology and Science<\/a><\/td>\n<\/tr>\n<tr style=\"height: 95px;\">\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.145px; height: 95px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10555110\">Time Series Problems in the Energy Sector<\/a><\/td>\n<td style=\"width: 381.707px; height: 95px;\">Christos Dalamagkas, Angelos Georgakis, Ioannis Papadopoulos, Kostas Hrissagis-Chrysagis, George Papadakis<\/td>\n<td style=\"width: 381.707px; height: 95px;\"><\/td>\n<td style=\"width: 225.976px; height: 95px;\">2024 IEEE 40th International Conference on Data Engineering Workshops (ICDEW)<\/a><\/td>\n<\/tr>\n<tr style=\"height: 275px;\">\n<td style=\"width: 381.707px; height: 275px;\"><\/td>\n<td style=\"width: 225.145px; height: 275px;\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-97-0903-8_30\">The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication &#8211; For Better or For Worse<\/a><\/td>\n<td style=\"width: 381.707px; height: 275px;\">Aleksandra Pawlicka, Marek Pawlicki, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 275px;\"><\/td>\n<td style=\"width: 225.976px; height: 275px;\">ICAI, SPRINGER CCIS<\/td>\n<\/tr>\n<tr style=\"height: 208px;\">\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.145px; height: 208px;\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-97-4982-9_6\">A novel approach to the use of explainability to mine network intrusion detection rules<\/a><\/td>\n<td style=\"width: 381.707px; height: 208px;\">Federica Uccello, Marek Pawlicki, Salvatore D\u2019Antonio, Rafal Kozik, and Michal Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.976px; height: 208px;\">ACIIDS<\/td>\n<\/tr>\n<tr style=\"height: 141px;\">\n<td style=\"width: 381.707px; height: 141px;\"><\/td>\n<td style=\"width: 225.145px; height: 141px;\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670905\">Introducing a Multi-Perspective xAI Tool for Better Model Explainability<\/a><\/td>\n<td style=\"width: 381.707px; height: 141px;\">Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafa\u0142 Kozik, Micha\u0142 Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 141px;\"><\/td>\n<td style=\"width: 225.976px; height: 141px;\">ARES 2024<\/td>\n<\/tr>\n<tr style=\"height: 275px;\">\n<td style=\"width: 381.707px; height: 275px;\"><\/td>\n<td style=\"width: 225.145px; height: 275px;\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0925231224012219?via%3Dihub\">Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case<\/a><\/td>\n<td style=\"width: 381.707px; height: 275px;\">Rafa\u0142 Kozik, Gracjan K\u0105tek, Marta Gackowska, Sebastian Kula, Joanna Komorniczak, Pawe\u0142 Ksieniewicz, Aleksandra Pawlicka, Marek Pawlicki, Micha\u0142 Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 275px;\"><\/td>\n<td style=\"width: 225.976px; height: 275px;\">Neurocomputing<\/td>\n<\/tr>\n<tr style=\"height: 141px;\">\n<td style=\"width: 381.707px; height: 141px;\"><\/td>\n<td style=\"width: 225.145px; height: 141px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10663744\">ARIA, HaRIA and GeRIA: Novel Metrics for Pre-Model Interpretability<\/a><\/td>\n<td style=\"width: 381.707px; height: 141px;\">Marek Pawlicki<\/td>\n<td style=\"width: 381.707px; height: 141px;\"><\/td>\n<td style=\"width: 225.976px; height: 141px;\">IEEE Access<\/td>\n<\/tr>\n<tr style=\"height: 208px;\">\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.145px; height: 208px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10677499\/authors#authors\">Federated Learning: Challenges, SoTA, Performance Improvements and Application Domains<\/a><\/td>\n<td style=\"width: 381.707px; height: 208px;\">Ioannis Schoinas, Anna Triantafyllou, Dimosthenis Ioannidis, Dimitrios Tzovaras, Anastasios Drosou, Konstantinos Votis, Thomas Lagkas, Vasileios Argyriou, Panagiotis Sarigiannidis<\/td>\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.976px; height: 208px;\">IEEE Open Journal of the Communications Society : Volume 5<\/td>\n<\/tr>\n<tr style=\"height: 208px;\">\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.145px; height: 208px;\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10679429\">AI4COLLAB: An AI-based Threat Information Sharing Platform<\/a><\/td>\n<td style=\"width: 381.707px; height: 208px;\">Christos Dalamagkas, Dimitrios Asimopoulos, Panagiotis Radoglou-Grammatikis, Nikolaos Maropoulos, Thomas Lagkas, Vasileios Argyriou, Gohar Sargsyan, Panagiotis Sarigiannidis<\/td>\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.976px; height: 208px;\">\u0399\u0395\u0395\u0395<\/td>\n<\/tr>\n<tr style=\"height: 208px;\">\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.145px; height: 208px;\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10462-024-10972-3\">The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation<\/a><\/td>\n<td style=\"width: 381.707px; height: 208px;\">Marek Pawlicki, Aleksandra Pawlicka, Rafa\u0142 Kozik &amp; Micha\u0142 Chora\u015b<\/td>\n<td style=\"width: 381.707px; height: 208px;\"><\/td>\n<td style=\"width: 225.976px; height: 208px;\">Artificial Intelligence Review<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><script>\n\/**\n * Funcion para ordenar una tabla... tiene que recibir el numero de columna a\n * ordenar y el tipo de orden\n * @param int n\n * @param str type - ['str'|'int']\n *\/\nfunction sortTable(n,type) {\n  var table, rows, switching, i, x, y, shouldSwitch, dir, switchcount = 0;<\/p>\n<p>  table = document.getElementById(\"myTable\");\n  switching = true;\n  \/\/Set the sorting direction to ascending:\n  dir = \"asc\";<\/p>\n<p>  \/*Make a loop that will continue until no switching has been done:*\/\n  while (switching) {\n    \/\/start by saying: no switching is done:\n    switching = false;\n    rows = table.rows;\n    \/*Loop through all table rows (except the first, which contains table headers):*\/\n    for (i = 1; i < (rows.length - 1); i++) {       \/\/start by saying there should be no switching:       shouldSwitch = false;       \/*Get the two elements you want to compare, one from current row and one from the next:*\/       x = rows[i].getElementsByTagName(\"TD\")[n];       y = rows[i + 1].getElementsByTagName(\"TD\")[n];       \/*check if the two rows should switch place, based on the direction, asc or desc:*\/       if (dir == \"asc\") {         if ((type==\"str\" &#038;&#038; x.innerHTML.toLowerCase() > y.innerHTML.toLowerCase()) || (type==\"int\" && parseFloat(x.innerHTML) > parseFloat(y.innerHTML))) {\n          \/\/if so, mark as a switch and break the loop:\n          shouldSwitch= true;\n          break;\n        }\n      } else if (dir == \"desc\") {\n        if ((type==\"str\" && x.innerHTML.toLowerCase() < y.innerHTML.toLowerCase()) || (type==\"int\" &#038;&#038; parseFloat(x.innerHTML) < parseFloat(y.innerHTML))) {\n          \/\/if so, mark as a switch and break the loop:\n          shouldSwitch = true;\n          break;\n        }\n      }\n    }\n    if (shouldSwitch) {\n      \/*If a switch has been marked, make the switch and mark that a switch has been done:*\/\n      rows[i].parentNode.insertBefore(rows[i + 1], rows[i]);\n      switching = true;\n      \/\/Each time a switch is done, increase this count by 1:\n      switchcount ++;\n    } else {\n      \/*If no switching has been done AND the direction is \"asc\", set the direction to \"desc\" and run the while loop again.*\/\n      if (switchcount == 0 &#038;&#038; dir == \"asc\") {\n        dir = \"desc\";\n        switching = true;\n      }\n    }\n  }\n}\n<\/script>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.14.8\" _module_preset=\"default\" global_colors_info=\"{}\"][et_pb_column type=\"4_4\" _builder_version=\"4.14.8\" _module_preset=\"default\" global_colors_info=\"{}\"][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RESEARCH PAPERS Publication Date Title Authors Partners Conference\/Journal Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures &#8211; Application to Anomaly Detection. Anis Bouaziz, Manh-Dung Nguyen, Valeria Vald\u00e8s, Ana Rosa Cavalli and Wissam Mallouli ICSOFT 2023 &#8211; 18th International Conference on Software Technologies Interpreting Intrusions &#8211; The Role of Explainability in AI-based Intrusion Detection Systems [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-60","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages\/60","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60"}],"version-history":[{"count":41,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":1897,"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=\/wp\/v2\/pages\/60\/revisions\/1897"}],"wp:attachment":[{"href":"https:\/\/ai4cyber.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}