{"id":18120,"date":"2021-11-04T10:25:07","date_gmt":"2021-11-04T09:25:07","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/monitorovani-zabezpeceni-prostredi-active-directory-zalozene-na-technikach-strojoveho-uceni\/"},"modified":"2021-11-04T10:25:07","modified_gmt":"2021-11-04T09:25:07","slug":"monitorovani-zabezpeceni-prostredi-active-directory-zalozene-na-technikach-strojoveho-uceni","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/monitorovani-zabezpeceni-prostredi-active-directory-zalozene-na-technikach-strojoveho-uceni\/","title":{"rendered":"Security Monitoring of Active Directory Environment Based on Machine Learning Techniques"},"content":{"rendered":"","protected":false},"featured_media":684,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[45,138],"thesis-year":[248],"class_list":["post-18120","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-248"],"acf":{"autor":"Luk\u00e1\u0161 Kotlaba","portret":"","vedouci":"Ing. Simona Buchoveck\u00e1, Ph.D."},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/18120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/18120\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/684"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=18120"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=18120"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=18120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}