{"id":3958,"date":"2023-01-07T18:16:07","date_gmt":"2023-01-07T18:16:07","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3958"},"modified":"2023-11-21T19:15:20","modified_gmt":"2023-11-21T19:15:20","slug":"trainings","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/","title":{"rendered":"Trainings"},"content":{"rendered":"<div class=\"mai-grid entries entries-grid has-image-background\" style=\"--entry-title-font-size:var(--font-size-lg);--aspect-ratio:1\/1;--align-text:center;--align-text-vertical:center;--border-radius:0px;--entry-meta-text-align:center;\"><div class=\"entries-wrap has-columns\" style=\"--columns-xs:1\/1;--columns-sm:1\/1;--columns-md:1\/3;--columns-lg:1\/3;--flex-xs:0 0 var(--flex-basis);--flex-sm:0 0 var(--flex-basis);--flex-md:0 0 var(--flex-basis);--flex-lg:0 0 var(--flex-basis);--column-gap:var(--spacing-lg);--row-gap:var(--spacing-lg);--align-columns:start;\"><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:1;\" aria-label=\"Program\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/program\/\" aria-labelledby=\"entry-title-1\"><\/a><h3 class=\"entry-title\" id=\"entry-title-1\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/program\/\" rel=\"bookmark\">Program<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:2;\" aria-label=\"Speakers\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/aaya.jpeg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/aaya-80x80.jpeg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/aaya-150x150.jpeg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/aaya.jpeg 200w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/speakers_25\/\" aria-labelledby=\"entry-title-2\"><\/a><h3 class=\"entry-title\" id=\"entry-title-2\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/speakers_25\/\" rel=\"bookmark\">Speakers<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:3;\" aria-label=\"AICAD4Sec Workshop 2025\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-400x400.jpg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-768x768.jpg 768w, http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img-800x800.jpg 800w, http:\/\/cad4security.org\/wp-content\/uploads\/2_icon_img.jpg 905w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/\" aria-labelledby=\"entry-title-3\"><\/a><h3 class=\"entry-title\" id=\"entry-title-3\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/\" rel=\"bookmark\">AICAD4Sec Workshop 2025<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:4;\" aria-label=\"Workshop Organizers\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-400x400.png\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-80x80.png 80w, http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-150x150.png 150w, http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-300x300.png 300w, http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-400x400.png 400w, http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-768x768.png 768w, http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res-800x800.png 800w, http:\/\/cad4security.org\/wp-content\/uploads\/hadi_id_sq_z1_res.png 814w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/oc_workshop_2025\/\" aria-labelledby=\"entry-title-4\"><\/a><h3 class=\"entry-title\" id=\"entry-title-4\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/cad4sec-workshop-2025\/oc_workshop_2025\/\" rel=\"bookmark\">Workshop Organizers<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:5;\" aria-label=\"SoC Vulnerability #3\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-3\/\" aria-labelledby=\"entry-title-5\"><\/a><h3 class=\"entry-title\" id=\"entry-title-5\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-3\/\" rel=\"bookmark\">SoC Vulnerability #3<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:6;\" aria-label=\"SoC Vulnerability #6\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-6\/\" aria-labelledby=\"entry-title-6\"><\/a><h3 class=\"entry-title\" id=\"entry-title-6\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-6\/\" rel=\"bookmark\">SoC Vulnerability #6<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:7;\" aria-label=\"SoC Vulnerability #5\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-5\/\" aria-labelledby=\"entry-title-7\"><\/a><h3 class=\"entry-title\" id=\"entry-title-7\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-5\/\" rel=\"bookmark\">SoC Vulnerability #5<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:8;\" aria-label=\"SoC Vulnerability #4\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-4\/\" aria-labelledby=\"entry-title-8\"><\/a><h3 class=\"entry-title\" id=\"entry-title-8\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-4\/\" rel=\"bookmark\">SoC Vulnerability #4<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:9;\" aria-label=\"SoC Vulnerability #2\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-2\/\" aria-labelledby=\"entry-title-9\"><\/a><h3 class=\"entry-title\" id=\"entry-title-9\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-2\/\" rel=\"bookmark\">SoC Vulnerability #2<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:10;\" aria-label=\"SoC Vulnerability #1\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/automation-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/automation-400x400.jpg 400w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-1\/\" aria-labelledby=\"entry-title-10\"><\/a><h3 class=\"entry-title\" id=\"entry-title-10\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/soc-vulnerability-1\/\" rel=\"bookmark\">SoC Vulnerability #1<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link page type-page\" style=\"--entry-index:11;\" aria-label=\"SoC Vulnerability Database\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/\" aria-labelledby=\"entry-title-11\"><\/a><h3 class=\"entry-title\" id=\"entry-title-11\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/riscv-vulnerability-details\/\" rel=\"bookmark\">SoC Vulnerability Database<\/a><\/h3>\n<\/div><\/article><article class=\"entry entry-grid is-column has-entry-link has-image has-image-first page type-page\" style=\"--entry-index:12;\" aria-label=\"HOST 2024\" itemscope itemtype=\"https:\/\/schema.org\/CreativeWork\"><figure class=\"entry-image-link\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"http:\/\/cad4security.org\/wp-content\/uploads\/3_icon_img-400x400.jpg\" class=\"entry-image size-square-sm\" alt=\"\" srcset=\"http:\/\/cad4security.org\/wp-content\/uploads\/3_icon_img-80x80.jpg 80w, http:\/\/cad4security.org\/wp-content\/uploads\/3_icon_img-150x150.jpg 150w, http:\/\/cad4security.org\/wp-content\/uploads\/3_icon_img-300x300.jpg 300w, http:\/\/cad4security.org\/wp-content\/uploads\/3_icon_img-400x400.jpg 400w, http:\/\/cad4security.org\/wp-content\/uploads\/3_icon_img.jpg 675w\" sizes=\"(max-width:599px) 599px, (min-width:600px) and (max-width: 799px) 799px, (min-width:800px) and (max-width: 999px) 333px, (min-width:1000px) 400px\" \/><\/figure><div class=\"entry-wrap entry-wrap-grid\"><a class=\"entry-overlay entry-overlay-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/host-2024\/\" aria-labelledby=\"entry-title-12\"><\/a><h3 class=\"entry-title\" id=\"entry-title-12\" itemprop=\"headline\"><a class=\"entry-title-link\" href=\"http:\/\/cad4security.org\/index.php\/technical-events\/host-2024\/\" rel=\"bookmark\">HOST 2024<\/a><\/h3>\n<\/div><\/article><\/div><\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default has-lg-margin-top has-lg-margin-bottom\">\n\n\n\n<h2 class=\"wp-block-heading is-style-subheading\">Courses<\/h2>\n\n\n<div class=\"mai-columns\"><div class=\"mai-columns-wrap has-columns\" style=\"--column-gap:var(--spacing-xl);--row-gap:var(--spacing-xl);--align-columns:start;--align-columns-vertical:initial;\">\n<div class=\"mai-column is-column has-md-padding has-background has-light-background\" style=\"--columns-xs:1\/1;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/2;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/2;--flex-lg:0 0 var(--flex-basis);--justify-content:start;background:var(--color-alt);\">\n\n<h3 class=\"wp-block-heading is-style-subheading has-text-color has-md-font-size has-links-color\">Advanced Digital Design Project<\/h3>\n\n\n\n<p class=\"has-sm-font-size\">In this course, students will learn about automated digital design. They will learn to utilize a hardware description language (HDL) in the digital design process. The language of choice is Verilog. Emphasis is on system level concepts and high-level design, and the language syntax will be presented to support the realization of the presented concepts. The students will get to design, synthesize (compile), simulate, and optimize the digital design, on a real hardware simulation platform. More specifically, a commercial computer aided design tool will be used to design a series of increasingly sophisticated designs on field programmable gate arrays (FPGAs).<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button wp-element-button\" href=\"https:\/\/aceslabucsd.github.io\/ece111-FA21\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"mai-column is-column has-md-padding has-background has-light-background\" style=\"--columns-xs:1\/1;--flex-xs:0 0 var(--flex-basis);--columns-sm:1\/2;--flex-sm:0 0 var(--flex-basis);--columns-md:1\/2;--flex-md:0 0 var(--flex-basis);--columns-lg:1\/2;--flex-lg:0 0 var(--flex-basis);--justify-content:start;background:var(--color-alt);\">\n\n<h3 class=\"wp-block-heading is-style-subheading has-text-color has-md-font-size has-links-color\">Optimization and Acceleration of Deep Learning on Various Hardware Platforms<\/h3>\n\n\n\n<p class=\"has-sm-font-size\">This course aims to present the mathematical, and computational challenges for holistic content\/algorithm\/hardware co-design of an efficient Deep Learning (DL) framework. We will discuss selected DL topics including DNNs, CNNs, GNN and Transformers in both supervised and unsupervised settings. Special emphasis will be on optimizing DL physical performance (e.g., real-time performance, energy, memory, and power) on different hardware platforms.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button wp-element-button\" href=\"https:\/\/aceslabucsd.github.io\/ece226-SP23\/\" target=\"_blank\" rel=\"noreferrer noopener\">learn more<\/a><\/div>\n<\/div>\n\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Courses<\/p>\n","protected":false},"author":6,"featured_media":2541,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3958"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3958"}],"version-history":[{"count":20,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3958\/revisions"}],"predecessor-version":[{"id":5286,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3958\/revisions\/5286"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2541"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}