{"id":42,"date":"2020-08-05T11:21:41","date_gmt":"2020-08-05T10:21:41","guid":{"rendered":"https:\/\/security-hub.ro\/en\/?page_id=42"},"modified":"2021-09-30T20:40:36","modified_gmt":"2021-09-30T19:40:36","slug":"publications","status":"publish","type":"page","link":"https:\/\/security-hub.ro\/en\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<p><strong>2018:<\/strong><\/p>\n\n\n\n<ol><li>A. Pauna, A.C. Iacob, and I. Bica, \u201cQRASSH \u2013 A self-adaptive SSH Honeypot driven by Q-Learning,\u201d in Proceedings of the 2018 International Conference on Communications (COMM), Bucharest, Romania, 2018, pp. 441 \u2013 446, DOI: 10.1109\/ICComm.2018.8484261;<\/li><li>C. Grum\u0103zescu, V.A. Vl\u0103duta and A. Timofte, \u201cHybrid identity based cryptographic scheme optimization using machine learning in WSN,\u201d in Proceedings of the 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 2018;<\/li><li>I. Aciob\u0103ni\u021bei, R.Ioana. Guinea and M.L. Pura, \u201cAVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols,\u201d in Proceedings of the 15th International Joint Conference on e-Business and Telecommunications &#8211; Volume 1: SECRYPT, Porto, Portugal, 2018, pp. 520-525, ISBN: 978-989-758-319-3; DOI: 10.5220\/0006887906860691<\/li><li>I. Aciob\u0103ni\u021bei, I. C. Buhu\u0219 and M.L. Pura, \u201cUsing Cryptography in the Cloud for Lightweight Authentication Protocols Based on QR Codes,\u201d in Proceedings of the 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 2018, pp. 539 &#8211; 542, DOI: 10.1109\/SACI.2018.8440949;<\/li><li>I. Aciob\u0103ni\u021bei, I. C. Buhu\u0219 and M.L. Pura, \u201cLightweight version of SQRL authentication protocol based on cryptography in the cloud,\u201d in Proceedings of the 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI), Timisoara, Romania, 2018, pp. 173 -178, DOI: 10.1109\/SACI.2018.8440957;<\/li><li>F. Stancu, D. C. Tranc\u0103, M. Chiroiu and R. Rughini\u0219, \u201cEvaluation of cryptographic primitives on modern microcontroller platforms,\u201d in Proceedings of the 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), Cluj-Napoca, Romania, 2018, pp. 1-6, DOI: 10.1109\/ROEDUNET.2018.8514127;<\/li><li>A. Bican, R. Deaconescu, W. N. Chin and Q.T. Ta, \u201cVerification of C Buffer Overflows in C Programs,\u201d in Proceedings of the 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), Cluj-Napoca, Romania, 2018, pp. 1-6, DOI: 10.1109\/ROEDUNET.2018.8514126;<\/li><li>V. Velciu, F. Stancu and M. Chiroiu, \u201cHiddenApp &#8211; Securing Linux applications using ARM TrustZone,\u201d Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer, 2019 (acceptat spre publicare);<\/li><li>D. Sporici, M. Chiroiu and D. Cioc\u00eerlan, \u201cAn Evaluation of OCR Systems against Adversarial Machine Learning\u201d, Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer, 2019 (acceptat spre publicare);<\/li><li>C. Toma, B. Talpiga, C. Boja, M. Popa, B. Iancu and M. Zurini, \u201cSecure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology\u201d, Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer, 2019 (acceptat spre publicare);<\/li><li>C. Toma and M. Popa, \u201cIoT security issues for Industry 4.0 &#8211; Oil &amp; Gas Solution,\u201d in Proceedings of the 17th International Conference on Informatics in Economy (IE 2018) Education, Research &amp; Business Technologies, Iasi, Romania, 2018, pp. 113 &#8211; 118, ISSN 2284-7472;<\/li><li>C. Boja and M. Zurini, \u201cIoT security architecture based on device fingerprinting,\u201d in Proceedings of the 17th International Conference on Informatics in Economy (IE 2018) Education, Research &amp; Business Technologies, Iasi, Romania, 2018, pp. 157 &#8211; 162, ISSN 2284-7472;<\/li><li>C. Paduraru, M.C. Melemciuc, \u201cAn automatic test data generation tool using machine learning,\u201d in Proceedings of the 13th International Conference on Software Technologies &#8211; Volume 1: ICSOFT, Porto, Portugal, 2018, pp. 472-481, ISBN 978-989-758-320-9, DOI: 10.5220\/0006836605060515;<\/li><li>G. Ducoffe, \u201cA new application of Orthogonal Range Searching for computing Giant Graph Diameters,\u201d in Proceedings of 2nd Symposium on Simplicity in Algorithms (SOSA\u201919), San Diego, SUA, 2019 (acceptat spre publicare);<\/li><li>C. Toma and M. Popa, \u201cIoT Security Approaches in Oil &amp; Gas Solution Industry 4.0\u201d, Informatica Economic\u0103 vol. 22, no. 3\/2018, pp. 46 &#8211; 62, DOI: 10.12948\/issn14531305\/22.3.2018.05.<\/li><\/ol>\n\n\n\n<p><strong>2019:<\/strong><\/p>\n\n\n\n<ol><li>A. Pauna, I. Bica, F. Pop, and A. Castiglione, \u201cOn the rewards of self-adaptive IoT honeypots,\u201d Annals of Telecommunications, vol. 74, no. 7\u20138, pp. 501\u2013515, Jan. 2019, DOI: 10.1007\/s12243-018-0695-7;<\/li><li>B.-C. Chifor, S.-C. Arseni, I. Matei, and I. Bica, \u201cSecurity-Oriented Framework for Internet of Things Smart-Home Applications,\u201d 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019, DOI: 10.1109\/CSCS.2019.00033;<\/li><li>V.-A. Vladuta, I. Matei, and I. Bica, \u201cData Gathering Optimization in Wireless Sensor Networks Using Unmanned Aerial Vehicles,\u201d 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019, DOI: 10.1109\/CSCS.2019.00029;<\/li><li>V.-A. Vladuta, I. Bica, and V.-V. Patriciu, \u201cEnergy Efficient Trust-based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicle,\u201d 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Pite\u0219ti, Romania, June 2019;<\/li><li>I. Bica, B.-C. Chifor,&nbsp; \u0218-C. Arseni, and I. Matei, \u201cMulti-Layer IoT Security Framework for Ambient Intelligence Environments,\u201d Sensors, vol. 19, no. 18, p. 4038, Sep. 2019, DOI: 10.3390\/s19184038;<\/li><li>I. Bica, B.-C. Chifor,&nbsp; \u0218tefan-C. Arseni, and I. Matei, \u201cReputation-based Security Framework for Internet of Things,\u201d Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer (acceptat spre publicare);<\/li><li>I. Aciobanitei, P.-D. Urian, and M.-L. Pura, \u201cLearned Lessons from Implementing an Android Client for the Cloud Signature Consortium API,\u201d Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Springer (acceptat spre publicare);<\/li><li>A. Cosma, I.E. Radoi, and V. Radu, \u201cCamLoc: Pedestrian Location Estimation through Body Pose Estimation on Smart Cameras,\u201d 2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Pisa, Italy, Sep. 2019;<\/li><li>I.E. Radoi, D. Cirimpei, and V. Radu, \u201cLocalization Systems Repository: A Platform for Open-source Localization Systems and Datasets,\u201d 2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Pisa, Italy, Sep. 2019;<\/li><li>V. Pelin, and I.E. Radoi, \u201cPXNOR: Perturbative Binary Neural Network,\u201d 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), Galati, Romania, Oct. 2019;<\/li><li>V.-A. Stefanescu, I.E. Radoi, \u201cStress Level Prediction Using Data From Wearables,\u201d 2019 18th RoEduNet Conference: Networking in Education and Research (RoEduNet), Galati, Romania, Oct. 2019;<\/li><li>F.-A. Stancu, D.C. Tranc\u0103, and M. Chiroiu, \u201cTIO &#8211; Secure Input\/Output for Intel SGX Enclaves,\u201d 2019 International Workshop on Secure Internet of Things (SIoT 2019), Luxembourg, Sept. 2019;<\/li><li>R.-A. Mantu, D. Sporici, M. Chiroiu, \u201cControl Flow Integrity Based on Controlled Channel,\u201d 2019 22nd International Conference on Control Systems and Computer Science (CSCS), Bucharest, May 2019;<\/li><li>A.-I. Pandelea, and M. Chiroiu, \u201cPassword Guessing Using Machine Learning on Wearables,\u201d 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019;<\/li><li>A. Zamfiroiu, B. Iancu, C. Boja, T.-M. Georgescu, and C. Cartas, \u201cIoT Architectures for Critical Infrastructures Protection,\u201d 18th European Conference on Cyber Warfare and Security (ECCWS), Coimbra, Portugal, July 2019;<\/li><li>A. Zamfiroiu, P. Pocatilu, and S. Capisizu, \u201cMobile Data Vulnerabilities,\u201d Proceedings of the 18th International Conference on Informatics in Economy Education, Research and Business Technologies, Bucharest, Romania, May 2019, DOI: 10.12948\/ie2019.06.10;<\/li><li>C. Toma, M. Popa, M. Doinea, and B. Iancu, \u201cVoting Dapp In Embedded Devices Using Blockchain Technology And Security Challenges,\u201d Proceedings of the 18th International Conference on Informatics in Economy Education, Research and Business Technologies, Bucharest, Romania, May 2019, DOI: 10.12948\/ie2019.06.11;<\/li><li>C. Boja, C. Cartas, M. Zurini, \u201cWeb-based ad-hoc architecture for data processing in a decentralized Internet,\u201d Proceedings of the 18th International Conference on Informatics in Economy Education, Research and Business Technologies, Bucharest, Romania, May 2019, DOI: 10.12948\/ie2019.06.14;<\/li><li>C. Toma, A. Alexandru, M. Popa, and A. Zamfiroiu, \u201cIoT Solution for Smart Cities\u2019 Pollution Monitoring and the Security Challenges,\u201d Sensors, vol. 19, no. 15, p. 3401, Aug. 2019, DOI: 10.3390\/s19153401;<\/li><li>T.-M. Georgescu, B. Iancu, and M. Zurini, \u201cNamed-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks,\u201d Sensors, vol. 19, no. 15, p. 3380, Aug. 2019, DOI: 10.3390\/s19153380;<\/li><li>F. Stoican, and P. Irofti, \u201cAiding Dictionary Learning through Multi-Parametric Sparse Representation,\u201d Algorithms, vol. 12, no. 7, pp. 131-149, Jun. 2019, DOI: 10.3390\/a12070131;<\/li><li>P. Irofti, and B. Dumitrescu, \u201cPairwise Approximate K-SVD,\u201d ICASSP 2019 &#8211; 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2019, DOI: 10.1109\/ICASSP.2019.8683788;<\/li><li>P. Irofti and A. B\u0103ltoiu, \u201cMalware Identification with Dictionary Learning,\u201d 2019 27th European Signal Processing Conference (EUSIPCO), Sep. 2019;<\/li><li>G. Ducoffe, \u201cFaster approximation algorithms for computing shortest cycles on weighted graphs,\u201d International Colloquium on Automata, Languages and Programming (ICALP\u201919), Leibniz International Proceedings in Informatics (LIPIcs), vol. 132, pp. 49:1-49:13, 2019, DOI: 10.4230\/LIPIcs.ICALP.2019.49;<\/li><li>G. Ducoffe, \u201cThe 4-Steiner Root Problem,\u201d International Workshop on Graph Theoretic Concepts in Computer Science (WG\u201919), Vall de Nuria, Spain. Lecture Notes in Computer Science, vol 11789, 2019, DOI: 10.1007\/978-3-030-30786-8_2;<\/li><li>C. Paduraru and M. Paduraru, \u201cAutomatic Difficulty Management and Testing in Games using a Framework Based on Behavior Trees and Genetic Algorithms,\u201d 2019 24th International Conference on Engineering of Complex Computer Systems (ICECCS), Nov. 2019, DOI: 10.1109\/ICECCS.2019.00026;<\/li><li>C. Paduraru, M.-C. Melemciuc, and B. Ghimis, \u201cFuzz Testing with Dynamic Taint Analysis based Tools for Faster Code Coverage,\u201d Proceedings of the 14th International Conference on Software Technologies, 2019, DOI: 10.5220\/0007921300820093;<\/li><li>R. F. Olimid, \u201cSecRet: How to Apply the 5E Model for a Master\u2019s Level Network Security Course,\u201d IEEE Communications Magazine, vol. 57, no. 11, pp. 54\u201359, Nov. 2019, DOI: 10.1109\/MCOM.001.1900228;<\/li><li>A. Baltoiu and B. Dumitrescu, \u201cSize Adaptation of Separable Dictionary Learning with Information-Theoretic Criteria,\u201d 2019 22nd International Conference on Control Systems and Computer Science (CSCS), May 2019, DOI: 10.1109\/CSCS.2019.00009;<\/li><li>A. Panait, R. Olimid, and A. Stefanescu, \u201cIdentity management on blockchain &#8211; privacy and security aspects\u201d, Romanian Cryptology Days Conference 2019, pp.1-8, to appear in Proceedings of the Romanian Academy Series A &#8211; Mathematics Physics Technical Sciences Information Science, 2019;<\/li><li>C. Paduraru, M.-C. Melemciuc, and M. Paduraru, \u201cAutomatic Test Data Generation for a Given Set of Applications Using Recurrent Neural Networks,\u201d Software Technologies, pp. 307\u2013326, 2019, DOI: 10.1007\/978-3-030-29157-0_14;<\/li><li>C. Paduraru, B. Ghimis, and M. Paduraru, \u201cImplementation of Publisher-Subscriber paradigm using Virtual Organisms\u201d, 21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2019.<\/li><\/ol>\n\n\n\n<p><strong>2020:<\/strong><\/p>\n\n\n\n<ol><li>C. Lupascu, A. Lupascu, and I. Bica, \u201cDLT Based Authentication Framework for Industrial IoT Devices,\u201d Sensors, vol. 20, no. 9, p. 2621, May 2020;<\/li><li>I. Aciobanitei, I. Luculescu, and M.-L. Pura, \u201cQualified Electronic Signature SaaS Solution for Google Docs &amp; Google Sheets Documents,\u201d 2020 13th International Conference on Communications (COMM), Jun. 2020;<\/li><li>I. Aciobanitei, V. Dedita, M.-L. Pura, and V.-V. Patriciu, \u201cSABRES &#8211; A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures,\u201d 2020 13th International Conference on Communications (COMM), Jun. 2020;<\/li><li>L. Deshotels, C. Carabas, J. Beichler, R. Deaconescu, and W. Enck, \u201cKobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS,\u201d 2020 IEEE Symposium on Security and Privacy (SP), May 2020;<\/li><li>E.-C. Ruica, M.-L. Pura, and I. Aciobanitei, \u201cImplementing Cloud Qualified Electronic Signatures for Documents using Available Cryptographic Libraries: A Survey,\u201d 2020 13th International Conference on Communications (COMM), Jun. 2020;<\/li><li>T.-M. Georgescu, B. Iancu, A. Zamfiroiu, M. Doinea, C. E. Boja, and C. Cartas, \u201cA Survey on Named Entity Recognition Solutions Applied for Cybersecurity-Related Text Processing,\u201d Advances in Intelligent Systems and Computing, pp. 316\u2013325, Oct. 2020;<\/li><li>C. Toma, M. Popa, M. Doinea, \u201cA.I. neural networks inference into the IoT embedded devices using TinyML for pattern detection within a security system,\u201d Proceedings of the IE 2020 International Conference, May 2020;<\/li><li>A. Zamfiroiu, B. Iancu, C. Boja, T.-M. Georgescu, C. Cartas, M. Popa, and C. V. Toma, \u201cIoT Communication Security Issues for Companies: Challenges, Protocols and The Web of Data,\u201d Proceedings of the International Conference on Business Excellence, vol. 14, no. 1, pp. 1109\u20131120, Jul. 2020;<\/li><li>T.-M. Georgescu, \u201cNatural Language Processing Model for Automatic Analysis of Cybersecurity-Related Documents,\u201d Symmetry, vol. 12, no. 3, p. 354, Mar. 2020;<\/li><li>C. Paduraru, M. Paduraru, and A. Stefanescu, \u201cOptimizing decision making in concolic execution using reinforcement learning,\u201d 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Oct. 2020;<\/li><li>M. Cernat, A.-N. Staicu, and A. Stefanescu, \u201cTowards Automated Testing of RPA Implementations\u201d, In Proc. of A-TEST\u201920, workshop affiliated to ESEC\/FSE&#8217;20, pp. 21-24, ACM, 2020;<\/li><li>A. P\u0103tra\u015fcu, C. P\u0103duraru, and P. Irofti, \u201cStochastic SPG with Minibatches,\u201d Studies in Computational Intelligence, pp. 3\u201325, Sep. 2020;<\/li><li>C. I. Paduraru and G. Stefanescu, \u201cAdaptive Virtual Organisms: A Compositional Model for Complex Hardware-software Binding\u201d, Fundamenta Informaticae, vol. 173, no. 2\u20133, pp. 139\u2013176, Mar. 2020;<\/li><li>C. Paduraru, B. Ghimis, and A. Stefanescu, \u201cRiverConc: An Open-source Concolic Execution Engine for x86 Binaries,\u201d Proceedings of the 15th International Conference on Software Technologies, 2020;<\/li><li>M. Cernat, A.-N. Staicu, and A. Stefanescu, \u201cImproving UI Test Automation using Robotic Process Automation,\u201d Proceedings of the 15th International Conference on Software Technologies, 2020;<\/li><li>P. Irofti, and A. B\u0103ltoiu, \u201cUnsupervised dictionary learning for anomaly detection,\u201d To appear in Proc. of iTWIST\u201920 (international Traveling Workshop on Interactions between low-complexity data models and Sensing Techniques), 2020;<\/li><li>A. B\u0103ltoiu, A. P\u0103tra\u0219cu, and P. Irofti, \u201cGraph Anomaly Detection Using Dictionary Learning,\u201d To appear in The 21st World Congress of the International Federation of Automatic Control, 2020, pp. 1-8;<\/li><li>C. Paduraru, A. Stefanescu, and B. Ghimis, \u201cTesting Multi-tenant Applications using Fuzzing and Reinforcement Learning\u201c. In Proc. of LANGETI&#8217;20, workshop affiliated to ESEC\/FSE&#8217;20, pp. 1-6, ACM, 2020;<\/li><li>B. Ghimis, M. Paduraru, and A. Stefanescu,&nbsp; \u201dRIVER 2.0: An Open-Source Testing Framework using AI Techniques,\u201d; In Proc. of LANGETI&#8217;20, workshop affiliated to ESEC\/FSE&#8217;20, pp. 13-18, ACM, 2020;<\/li><li>A.-E. Panait, R. F. Olimid, and A. Stefanescu, \u201dIdentity Management on Blockchain &#8211; Privacy and Security Aspects\u201d, Proceedings of the Romanian Academy, Series A, Volume 21, Number 1\/2020, pp. 45-52, 2020;<\/li><li>A.-E. Panait, R. F. Olimid, and A. Stefanescu, \u201cAnalysis of uPort Open, an Identity Management Blockchain-Based Solution,\u201d Lecture Notes in Computer Science, pp. 3\u201313, 2020.<\/li><\/ol>\n\n\n\n<p><strong>2021:<\/strong><\/p>\n\n\n\n<ol type=\"1\"><li>S-C. Arseni, B.-C. Chifor, M. Coca, M. Medvei, I. Bica, and I. Matei, \u201cRESFIT: A Reputation and Security Monitoring Platform for IoT Applications,\u201d Electronics, vol. 10, no. 15, p. 1840, Jul. 2021 (Revista ISI, IF\/2020: 2,397);<\/li><li>I. Apostol, M. Preda, C. Nila, and I. Bica, \u201cIoT Botnet Anomaly Detection Using Unsupervised Deep Learning,\u201d Electronics, vol. 10, no. 16, p. 1876, Aug. 2021 (Revista ISI, IF\/2020: 2,397);<\/li><li>I. Bica, R. L. Unc, and&nbsp; S. Turcanu, \u201cVirtualization and Automation for Cybersecurity Training and Experimentation,\u201d&nbsp; Innovative Security Solutions for Information Technology and Communications, Lecture Notes in Computer Science, Vol. 12596, pp. 227\u2013241, Springer, 2021 (Conferin\u021b\u0103 BDI: Scopus);<\/li><li>C. Toma, M. Popa, M Doinea, \u201cCloud Authentication using FIDO compliant Java Card Technology Secure Elements\u201d, The 20th International Conference on Informatics in Economy, Bucharest, Romania, 2021 (Conferin\u021b\u0103 ISI);<\/li><li>R. Deaconescu, T. Georgescu, A. B\u0103l\u021boiu, A. Puncioiu, \u201cUsing cybersecurity exercises as essential learning tools in universities,\u201d The 14th International Conference on Computer Supported Education, Prague, 2022 (sub evaluare).<\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2018: A. Pauna, A.C. Iacob, and I. Bica, \u201cQRASSH \u2013 A self-adaptive SSH Honeypot driven by Q-Learning,\u201d in Proceedings of the 2018 International Conference on Communications (COMM), Bucharest, Romania, 2018, pp. 441 \u2013 446, DOI: 10.1109\/ICComm.2018.8484261; C. Grum\u0103zescu, V.A. Vl\u0103duta and A. Timofte, \u201cHybrid identity based cryptographic scheme optimization using machine learning in WSN,\u201d in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/pages\/42"}],"collection":[{"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/comments?post=42"}],"version-history":[{"count":3,"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":70,"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/pages\/42\/revisions\/70"}],"wp:attachment":[{"href":"https:\/\/security-hub.ro\/en\/wp-json\/wp\/v2\/media?parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}