{"id":10603,"date":"2025-02-10T11:39:56","date_gmt":"2025-02-10T11:39:56","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=10603"},"modified":"2025-02-10T12:36:11","modified_gmt":"2025-02-10T12:36:11","slug":"k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/","title":{"rendered":"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d"},"content":{"rendered":"<div id=\"pl-10603\"  class=\"panel-layout\" ><div id=\"pg-10603-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-10603-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-10603-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>K3Y Ltd is proud to announce that the paper titled <strong><em>\"Trustworthy Analytics in ETSI ZSM: A 5G Security Case Study\"<\/em><\/strong> was published in IEEE Open Journal of the Communications Society: <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10766438\">https:\/\/ieeexplore.ieee.org\/document\/10766438<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The authors (<a href=\"https:\/\/www.linkedin.com\/in\/panagiotisrg\/\">Panagiotis Radoglou Grammatikis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/efklidis-katsaros-353bb4145\/\">Efklidis Katsaros<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/syrmosevangelos\/\">Evangelos Syrmos<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/georgioskatsikas\/\">Georgios P. Katsikas<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/dimitriosklonidis\/\">Dimitrios Klonidis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/vasilis-argyriou\/\">Vasileios Argyriou<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/thomas-lagkas-39484a18\/\">Thomas Lagkas<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/panagiotis-sarigiannidis-7636901a\/\">Panagiotis Sarigiannidis<\/a>) explore how cross-domain storage, communication, and analytics services can enhance security within the 5G core. Specifically, the study examines the deployment of a <strong><em>User Plane Function (UPF)<\/em><\/strong> with AI-powered intrusion detection, ensuring its security before onboarding. The research models the attacker and defender strategies through a novel security game, where the attacker attempts to deceive the defender with adversarial attacks, while the defender leverages early detection and adversarial training to protect the AI models. In this security game, the <strong><em>Bayesian Nash equilibrium<\/em><\/strong> determines the optimal strategy for both attackers and defenders. Furthermore, experimental results demonstrate how cross-domain analytics can be utilized to assess AI security risks and enhance network resilience.<\/p>\n<p>&nbsp;<\/p>\n<p>This paper was carried out in the context of <a href=\"https:\/\/across-he.eu\/\">ACROSS Horizon Europe<\/a> Project.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>K3Y Ltd is proud to announce that the paper titled &#8220;Trustworthy Analytics in ETSI ZSM: A 5G Security Case Study&#8221; was published in IEEE Open Journal of the Communications Society: https:\/\/ieeexplore.ieee.org\/document\/10766438 &nbsp; The authors (Panagiotis Radoglou Grammatikis, Efklidis Katsaros, Evangelos Syrmos, Georgios P. Katsikas, Dimitrios Klonidis, Vasileios Argyriou, Thomas Lagkas and Panagiotis Sarigiannidis) explore how&hellip; <a class=\"more-link\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/\">\u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf <span class=\"screen-reader-text\">K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":10670,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[8],"class_list":["post-10603","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d - k3y\" \/>\n<meta property=\"og:description\" content=\"K3Y Ltd is proud to announce that the paper titled &quot;Trustworthy Analytics in ETSI ZSM: A 5G Security Case Study&quot; was published in IEEE Open Journal of the Communications Society: https:\/\/ieeexplore.ieee.org\/document\/10766438 &nbsp; The authors (Panagiotis Radoglou Grammatikis, Efklidis Katsaros, Evangelos Syrmos, Georgios P. Katsikas, Dimitrios Klonidis, Vasileios Argyriou, Thomas Lagkas and Panagiotis Sarigiannidis) explore how&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-10T11:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-10T12:36:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2025\/02\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png\" \/>\n\t<meta property=\"og:image:width\" content=\"952\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"k3y news\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"k3y news\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u03bb\u03b5\u03c0\u03c4\u03cc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/\"},\"author\":{\"name\":\"k3y news\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"headline\":\"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d\",\"datePublished\":\"2025-02-10T11:39:56+00:00\",\"dateModified\":\"2025-02-10T12:36:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/\"},\"wordCount\":199,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png\",\"keywords\":[\"News\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/\",\"name\":\"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png\",\"datePublished\":\"2025-02-10T11:39:56+00:00\",\"dateModified\":\"2025-02-10T12:36:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png\",\"width\":952,\"height\":543},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\",\"name\":\"k3y news\",\"sameAs\":[\"https:\\\/\\\/deasytal.com\\\/\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/k3y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/","og_locale":"el_GR","og_type":"article","og_title":"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d - k3y","og_description":"K3Y Ltd is proud to announce that the paper titled \"Trustworthy Analytics in ETSI ZSM: A 5G Security Case Study\" was published in IEEE Open Journal of the Communications Society: https:\/\/ieeexplore.ieee.org\/document\/10766438 &nbsp; The authors (Panagiotis Radoglou Grammatikis, Efklidis Katsaros, Evangelos Syrmos, Georgios P. Katsikas, Dimitrios Klonidis, Vasileios Argyriou, Thomas Lagkas and Panagiotis Sarigiannidis) explore how&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d","og_url":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/","og_site_name":"k3y","article_published_time":"2025-02-10T11:39:56+00:00","article_modified_time":"2025-02-10T12:36:11+00:00","og_image":[{"width":952,"height":543,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2025\/02\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png","type":"image\/png"}],"author":"k3y news","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"k3y news","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"1 \u03bb\u03b5\u03c0\u03c4\u03cc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/"},"author":{"name":"k3y news","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"headline":"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d","datePublished":"2025-02-10T11:39:56+00:00","dateModified":"2025-02-10T12:36:11+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/"},"wordCount":199,"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2025\/02\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png","keywords":["News"],"articleSection":["Blog"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/","url":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/","name":"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2025\/02\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png","datePublished":"2025-02-10T11:39:56+00:00","dateModified":"2025-02-10T12:36:11+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2025\/02\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2025\/02\/Paper_Trustworthy-Analytics-in-ETSI-ZSM-A-5G-Security-Case-Study.png","width":952,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-trustworthy-analytics-in-etsi-zsm-a-5g-security-case-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"K3Y Ltd authors a paper on \u201cTrustworthy Analytics in ETSI ZSM: A 5G Security Case Study\u201d"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04","name":"k3y news","sameAs":["https:\/\/deasytal.com\/"],"url":"https:\/\/k3ylabs.com\/el\/author\/k3y\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/10603","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=10603"}],"version-history":[{"count":4,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/10603\/revisions"}],"predecessor-version":[{"id":10671,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/10603\/revisions\/10671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/10670"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=10603"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=10603"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=10603"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}