{"id":24292,"date":"2024-09-24T15:46:42","date_gmt":"2024-09-24T13:46:42","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/quantum-computing-methods-for-malware-classification\/"},"modified":"2024-09-24T15:46:42","modified_gmt":"2024-09-24T13:46:42","slug":"quantum-computing-methods-for-malware-classification","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/quantum-computing-methods-for-malware-classification\/","title":{"rendered":"Quantum Computing Methods for Malware Classification"},"content":{"rendered":"","protected":false},"featured_media":23688,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[45,284],"thesis-year":[391,406],"class_list":["post-24292","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-391","thesis-year-406"],"acf":{"autor":"Eli\u0161ka Kr\u00e1tk\u00e1","portret":"","vedouci":"Aur\u00e9l G\u00e1bor G\u00e1bris, Ph.D."},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/24292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/24292\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/23688"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=24292"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=24292"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=24292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}