{"version":"1.0","provider_name":"IMDEA Networks","provider_url":"https:\/\/networks.imdea.org\/es","author_name":"Marta Dorado","author_url":"https:\/\/networks.imdea.org\/es\/author\/marta-doradoimdea-org\/","title":"IoT Threats and Security - IMDEA Networks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"emp06Yycg5\"><a href=\"https:\/\/networks.imdea.org\/es\/actualidad\/agenda-de-eventos\/iot-threats-and-security\/\">IoT Threats and Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/networks.imdea.org\/es\/actualidad\/agenda-de-eventos\/iot-threats-and-security\/embed\/#?secret=emp06Yycg5\" width=\"600\" height=\"338\" title=\"\u00abIoT Threats and Security\u00bb \u2014 IMDEA Networks\" data-secret=\"emp06Yycg5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/networks.imdea.org\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/networks.imdea.org\/wp-content\/uploads\/2025\/06\/media-file-iot-1024x576.png","thumbnail_width":1024,"thumbnail_height":576,"description":"In this seminar, the presenter will provide an overview of the Computer Science Department and its programs and then discuss threats in the Internet of Things (IoT) computing and the security measures to minimize these threats. The rationale for organizing this seminar is to meet and get acquainted with our research collaborators at the IMDEA..."}