{"id":22666,"date":"2023-10-11T11:42:13","date_gmt":"2023-10-11T09:42:13","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/a-comparison-of-adversarial-learning-techniques-for-malware-detection\/"},"modified":"2023-10-11T11:42:13","modified_gmt":"2023-10-11T09:42:13","slug":"a-comparison-of-adversarial-learning-techniques-for-malware-detection","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/a-comparison-of-adversarial-learning-techniques-for-malware-detection\/","title":{"rendered":"A Comparison of Adversarial Learning Techniques for Malware Detection"},"content":{"rendered":"","protected":false},"featured_media":20968,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[45,284],"thesis-year":[350],"class_list":["post-22666","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-350"],"acf":{"autor":"Pavla Louth\u00e1nov\u00e1","portret":"","vedouci":"Martin Jure\u010dek"},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/22666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/22666\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/20968"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=22666"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=22666"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=22666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}