{"id":3998,"date":"2021-10-07T13:25:48","date_gmt":"2021-10-07T17:25:48","guid":{"rendered":"https:\/\/www.purdue.edu\/research\/features\/?p=3998"},"modified":"2021-10-07T13:27:29","modified_gmt":"2021-10-07T17:27:29","slug":"purdue-researchers-create-self-aware-algorithm-to-ward-off-hacking-attempts","status":"publish","type":"post","link":"https:\/\/www.purdue.edu\/research\/features\/stories\/purdue-researchers-create-self-aware-algorithm-to-ward-off-hacking-attempts\/","title":{"rendered":"Purdue researchers create \u2018self-aware\u2019 algorithm to ward off hacking attempts"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>It sounds like a scene from a spy thriller. An attacker gets through the IT defenses of a nuclear power plant and feeds it fake, realistic data, tricking its computer systems and personnel into thinking operations are normal. <\/p>\n","protected":false},"author":80,"featured_media":3995,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[34],"tags":[],"class_list":["post-3998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/posts\/3998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/comments?post=3998"}],"version-history":[{"count":3,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/posts\/3998\/revisions"}],"predecessor-version":[{"id":4001,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/posts\/3998\/revisions\/4001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/media\/3995"}],"wp:attachment":[{"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/media?parent=3998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/categories?post=3998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.purdue.edu\/research\/features\/wp-json\/wp\/v2\/tags?post=3998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}