{"id":556,"count":1,"description":"","link":"https:\/\/steveprudhomme.org\/index.php\/category\/informatique-information-et-ouvrages-generaux\/006-informatique-et-les-technologies-associees\/006-3-intelligence-artificielle\/006-3-04-application-de-lia-a-divers-domaines\/006-3-042-protection-des-infrastructures-critiques-et-lauto-adaptation-de-lia-en-cybersecurite\/","name":"006.3\/042 Protection des infrastructures critiques et l'auto-adaptation de l'IA en cybers\u00e9curit\u00e9","slug":"006-3-042-protection-des-infrastructures-critiques-et-lauto-adaptation-de-lia-en-cybersecurite","taxonomy":"category","parent":555,"meta":[],"_links":{"self":[{"href":"https:\/\/steveprudhomme.org\/index.php\/wp-json\/wp\/v2\/categories\/556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/steveprudhomme.org\/index.php\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/steveprudhomme.org\/index.php\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/steveprudhomme.org\/index.php\/wp-json\/wp\/v2\/categories\/555"}],"wp:post_type":[{"href":"https:\/\/steveprudhomme.org\/index.php\/wp-json\/wp\/v2\/posts?categories=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}