{"id":3121,"date":"2024-04-03T08:55:45","date_gmt":"2024-04-03T08:55:45","guid":{"rendered":"https:\/\/k3ylabs.com\/?p=3121"},"modified":"2024-04-03T08:55:47","modified_gmt":"2024-04-03T08:55:47","slug":"k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks","status":"publish","type":"post","link":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/","title":{"rendered":"K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;"},"content":{"rendered":"<div id=\"pl-3121\"  class=\"panel-layout\" ><div id=\"pg-3121-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-3121-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-3121-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p>K3Y Ltd is proud to share that the paper entitled <em>\"5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks\" was presented in <a href=\"https:\/\/globecom2023.ieee-globecom.org\/\">IEEE Global Communications Conference (GLOBECOM)<\/a>, that took place from 4th to 8th of December 2023 in Kuala Lumpur, Malaysia.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>The authors (<a href=\"https:\/\/www.linkedin.com\/in\/georgios-nakas-29a67a145\/\">George Nakas<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/panagiotisrg\/\">Panagiotis Radoglou Grammatikis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/georgios-a\/\">George Amponis<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/thomas-lagkas-39484a18\/\">Thomas Lagkas<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/vasilis-argyriou\/\">Vasileios Argyriou<\/a>,\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/sotirios-goudos-01b4b3158\/\">Sotirios Goudos<\/a> and <a href=\"https:\/\/www.linkedin.com\/in\/panagiotis-sarigiannidis-7636901a\/\">Panagiotis Sarigiannidis<\/a>) discuss potential applications of a smart fuzzer that takes full advantage of historical data in regards to the Packet Forwarding Control Protocol (PFCP). The fuzzer generates synthetic, malicious packets capable of disrupting communications between the Session Management Function (SMF) and User Plane Function (UPF) and leverages Generative Adversarial Networks.<\/p>\n<p>&nbsp;<\/p>\n<p>This work was implemented in the context of <a href=\"https:\/\/sancus-project.eu\/\">SANCUS<\/a> project.<\/p>\n<p>&nbsp;<\/p>\n<p>The paper is available in <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10464928\">IEEE Xplore<\/a> and <a href=\"https:\/\/www.researchgate.net\/publication\/379157107_5G-Fuzz_An_Attack_Generator_for_Fuzzing_5GC_using_Generative_Adversarial_Networks\">ResearchGate<\/a>.<\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>K3Y Ltd is proud to share that the paper entitled &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221; was presented in IEEE Global Communications Conference (GLOBECOM), that took place from 4th to 8th of December 2023 in Kuala Lumpur, Malaysia. &nbsp; The authors (George Nakas, Panagiotis Radoglou Grammatikis, George Amponis, Thomas Lagkas,&hellip; <a class=\"more-link\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/\">\u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf <span class=\"screen-reader-text\">K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":3125,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[8],"class_list":["post-3121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>K3Y Ltd authors a paper on &quot;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&quot; - k3y<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/\" \/>\n<meta property=\"og:locale\" content=\"el_GR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"K3Y Ltd authors a paper on &quot;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&quot; - k3y\" \/>\n<meta property=\"og:description\" content=\"K3Y Ltd is proud to share that the paper entitled &quot;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&quot; was presented in IEEE Global Communications Conference (GLOBECOM), that took place from 4th to 8th of December 2023 in Kuala Lumpur, Malaysia. &nbsp; The authors (George Nakas, Panagiotis Radoglou Grammatikis, George Amponis, Thomas Lagkas,&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"k3y\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T08:55:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-03T08:55:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/k3ylabs.com\/wp-content\/uploads\/2024\/04\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"871\" \/>\n\t<meta property=\"og:image:height\" content=\"879\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"k3y news\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc\" \/>\n\t<meta name=\"twitter:data1\" content=\"k3y news\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u03bb\u03b5\u03c0\u03c4\u03cc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/\"},\"author\":{\"name\":\"k3y news\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"headline\":\"K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;\",\"datePublished\":\"2024-04-03T08:55:45+00:00\",\"dateModified\":\"2024-04-03T08:55:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/\"},\"wordCount\":150,\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png\",\"keywords\":[\"News\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"el\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/\",\"name\":\"K3Y Ltd authors a paper on \\\"5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks\\\" - k3y\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png\",\"datePublished\":\"2024-04-03T08:55:45+00:00\",\"dateModified\":\"2024-04-03T08:55:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#breadcrumb\"},\"inLanguage\":\"el\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"el\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png\",\"contentUrl\":\"https:\\\/\\\/k3ylabs.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png\",\"width\":871,\"height\":879},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/blog\\\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/k3ylabs.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#website\",\"url\":\"https:\\\/\\\/k3ylabs.com\\\/\",\"name\":\"k3y\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/k3ylabs.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"el\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/k3ylabs.com\\\/#\\\/schema\\\/person\\\/9c622781378c531311096a78feb83f04\",\"name\":\"k3y news\",\"sameAs\":[\"https:\\\/\\\/deasytal.com\\\/\"],\"url\":\"https:\\\/\\\/k3ylabs.com\\\/el\\\/author\\\/k3y\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K3Y Ltd authors a paper on \"5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks\" - k3y","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/","og_locale":"el_GR","og_type":"article","og_title":"K3Y Ltd authors a paper on \"5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks\" - k3y","og_description":"K3Y Ltd is proud to share that the paper entitled \"5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks\" was presented in IEEE Global Communications Conference (GLOBECOM), that took place from 4th to 8th of December 2023 in Kuala Lumpur, Malaysia. &nbsp; The authors (George Nakas, Panagiotis Radoglou Grammatikis, George Amponis, Thomas Lagkas,&hellip; \u03a3\u03c5\u03bd\u03b5\u03c7\u03af\u03c3\u03c4\u03b5 \u03bd\u03b1 \u03b4\u03b9\u03b1\u03b2\u03ac\u03b6\u03b5\u03c4\u03b5 \u03c4\u03bf K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;","og_url":"https:\/\/k3ylabs.com\/el\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/","og_site_name":"k3y","article_published_time":"2024-04-03T08:55:45+00:00","article_modified_time":"2024-04-03T08:55:47+00:00","og_image":[{"width":871,"height":879,"url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2024\/04\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png","type":"image\/png"}],"author":"k3y news","twitter_card":"summary_large_image","twitter_misc":{"\u03a3\u03c5\u03bd\u03c4\u03ac\u03c7\u03b8\u03b7\u03ba\u03b5 \u03b1\u03c0\u03cc":"k3y news","\u0395\u03ba\u03c4\u03b9\u03bc\u03ce\u03bc\u03b5\u03bd\u03bf\u03c2 \u03c7\u03c1\u03cc\u03bd\u03bf\u03c2 \u03b1\u03bd\u03ac\u03b3\u03bd\u03c9\u03c3\u03b7\u03c2":"1 \u03bb\u03b5\u03c0\u03c4\u03cc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#article","isPartOf":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/"},"author":{"name":"k3y news","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"headline":"K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;","datePublished":"2024-04-03T08:55:45+00:00","dateModified":"2024-04-03T08:55:47+00:00","mainEntityOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/"},"wordCount":150,"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2024\/04\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png","keywords":["News"],"articleSection":["Blog"],"inLanguage":"el"},{"@type":"WebPage","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/","url":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/","name":"K3Y Ltd authors a paper on \"5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks\" - k3y","isPartOf":{"@id":"https:\/\/k3ylabs.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#primaryimage"},"image":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2024\/04\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png","datePublished":"2024-04-03T08:55:45+00:00","dateModified":"2024-04-03T08:55:47+00:00","author":{"@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04"},"breadcrumb":{"@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#breadcrumb"},"inLanguage":"el","potentialAction":[{"@type":"ReadAction","target":["https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/"]}]},{"@type":"ImageObject","inLanguage":"el","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#primaryimage","url":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2024\/04\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png","contentUrl":"https:\/\/k3ylabs.com\/wp-content\/uploads\/2024\/04\/5G-Fuzz_An-Attack-Generator-for-Fuzzing-5GC.png","width":871,"height":879},{"@type":"BreadcrumbList","@id":"https:\/\/k3ylabs.com\/blog\/k3y-ltd-authors-a-paper-on-5g-fuzz-an-attack-generator-for-fuzzing-5gc-using-generative-adversarial-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/k3ylabs.com\/"},{"@type":"ListItem","position":2,"name":"K3Y Ltd authors a paper on &#8220;5G-Fuzz: An Attack Generator for Fuzzing 5GC, using Generative Adversarial Networks&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/k3ylabs.com\/#website","url":"https:\/\/k3ylabs.com\/","name":"k3y","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/k3ylabs.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"el"},{"@type":"Person","@id":"https:\/\/k3ylabs.com\/#\/schema\/person\/9c622781378c531311096a78feb83f04","name":"k3y news","sameAs":["https:\/\/deasytal.com\/"],"url":"https:\/\/k3ylabs.com\/el\/author\/k3y\/"}]}},"_links":{"self":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/3121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/comments?post=3121"}],"version-history":[{"count":2,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/3121\/revisions"}],"predecessor-version":[{"id":3123,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/posts\/3121\/revisions\/3123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media\/3125"}],"wp:attachment":[{"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/media?parent=3121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/categories?post=3121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/k3ylabs.com\/el\/wp-json\/wp\/v2\/tags?post=3121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}