{"id":90192,"date":"2021-12-20T03:00:24","date_gmt":"2021-12-20T02:00:24","guid":{"rendered":"https:\/\/www.cde.ual.es\/?p=90192"},"modified":"2021-12-17T10:10:32","modified_gmt":"2021-12-17T09:10:32","slug":"artificial-intelligence-how-to-make-machine-learning-cyber-secure","status":"publish","type":"post","link":"https:\/\/www.cde.ual.es\/en\/artificial-intelligence-how-to-make-machine-learning-cyber-secure\/","title":{"rendered":"Artificial Intelligence: How to make Machine Learning Cyber Secure?"},"content":{"rendered":"<p class=\"content-summary\" data-diazo=\"summary\"><strong>How to prevent machine learning <a href=\"https:\/\/www.cde.ual.es\/la-covid-19-provoca-una-tendencia-al-alza-del-cibercrimen\/\">cyberattacks<\/a>? How to deploy controls without hampering performance? The European Union Agency for Cybersecurity answers the cybersecurity questions of machine learning.<\/strong><\/p>\n<p data-diazo=\"summary\"><a href=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg\"><img decoding=\"async\" class=\" wp-image-90209 aligncenter\" src=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg\" alt=\"\" width=\"535\" height=\"367\" srcset=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg 1280w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning-300x206.jpg 300w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning-1024x702.jpg 1024w, https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning-768x526.jpg 768w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/a><\/p>\n<p>Machine learning (ML) is currently the most developed and the most promising subfield of <a href=\"https:\/\/www.cde.ual.es\/en\/artificial-intelligence-threats-and-opportunities\/\">artificial intelligence<\/a> for industrial and government infrastructures. By providing new opportunities to solve decision-making problems intelligently and automatically, artificial intelligence (AI) is applied in almost all sectors of our economy.<\/p>\n<p>While the benefits of AI are significant and undeniable, the development of AI also induces new threats and challenges, identified in the ENISA\u00a0<a href=\"https:\/\/www.enisa.europa.eu\/publications\/artificial-intelligence-cybersecurity-challenges\">AI Threat Landscape<\/a>.<\/p>\n<p>Machine learning algorithms are used to give machines the ability to learn from data in order to solve tasks without being explicitly programmed to do so. However, such algorithms need extremely large volumes of data to learn. And because they do, they can also be subjected to specific cyber threats.<\/p>\n<p>The\u00a0<a href=\"https:\/\/www.cde.ual.es\/ficha\/securing-machine-learning-algorithms\/\">Securing Machine Learning Algorithms<\/a>\u00a0report\u00a0presents a taxonomy of ML techniques and core functionalities. The report also includes a mapping of the threats targeting ML techniques and the vulnerabilities of ML algorithms. It provides a list of relevant security controls recommended to enhance cybersecurity in systems relying on ML techniques. One of the challenges highlighted is how to select the security controls to apply without jeopardising the expected level of performance.<\/p>\n<p>The mitigation controls for ML specific attacks outlined in the report should in general be deployed during the entire lifecycle of systems and applications making use of ML.<\/p>\n<p><strong>Machine Learning Algorithms Taxonomy<\/strong><\/p>\n<p>Based on desk research and interviews with the experts of the ENISA\u00a0<a href=\"https:\/\/www.enisa.europa.eu\/topics\/iot-and-smart-infrastructures\/artificial_intelligence\/ad-hoc-working-group\/adhoc_wg_calls\">AI ad-hoc working group<\/a>, a total of 40 most commonly used ML algorithms were identified. The taxonomy developed is based on the analysis of such algorithms.<\/p>\n<p>The non-exhaustive taxonomy devised is to support the process of identifying which specific threats target ML algorithms, what are the associated vulnerabilities and the security controls needed to address those vulnerabilities.<\/p>\n<p><strong>Target audience<\/strong><\/p>\n<ul>\n<li>Public\/government: EU institutions &amp; agencies, regulatory bodies of Member States, supervisory authorities in data protection, military and intelligence agencies, law enforcement community, international organisations and national cybersecurity authorities.<\/li>\n<li>Industry at large including small &amp; medium enterprises (SMEs) resorting to AI solutions, operators of essential services\u00a0;<\/li>\n<li>AI technical, academic and research community, AI cybersecurity experts and AI experts such as designers, developers, ML experts, data scientists, etc.<\/li>\n<li>Standardisation bodies.<\/li>\n<\/ul>\n<h3>More information<\/h3>\n<p><a href=\"https:\/\/www.enisa.europa.eu\/news\/artificial-intelligence-how-to-make-machine-learning-cyber-secure\">Press release &#8211; ENISA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to prevent machine learning cyberattacks? How to deploy controls without hampering performance? The European Union Agency for Cybersecurity answers the cybersecurity questions of machine learning. Machine learning (ML) is currently the most developed and the most promising subfield of artificial intelligence for industrial and government infrastructures. By providing new opportunities to solve decision-making problems [&hellip;]<\/p>\n","protected":false},"author":101011,"featured_media":90209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4076,4075,346],"tags":[548,1482,2298],"class_list":{"0":"post-90192","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersec","8":"category-defence-security","9":"category-eu-news","10":"tag-cybersecurity","11":"tag-enisa","12":"tag-machine-learning","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Artificial Intelligence: How to make Machine Learning Cyber Secure? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cde.ual.es\/?p=90215\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Intelligence: How to make Machine Learning Cyber Secure? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"og:description\" content=\"How to prevent machine learning cyberattacks? How to deploy controls without hampering performance? The European Union Agency for Cybersecurity answers the cybersecurity questions of machine learning. Machine learning (ML) is currently the most developed and the most promising subfield of artificial intelligence for industrial and government infrastructures. By providing new opportunities to solve decision-making problems [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cde.ual.es\/?p=90215\" \/>\n<meta property=\"og:site_name\" content=\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-20T02:00:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"877\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BECA 2 CDE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:site\" content=\"@cdeualmeria\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BECA 2 CDE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215\"},\"author\":{\"name\":\"BECA 2 CDE\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/ee46ebc19edfa19598c02cff83335acc\"},\"headline\":\"Artificial Intelligence: How to make Machine Learning Cyber Secure?\",\"datePublished\":\"2021-12-20T02:00:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215\"},\"wordCount\":404,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/machine-learning.jpg\",\"keywords\":[\"cybersecurity\",\"ENISA\",\"Machine Learning\"],\"articleSection\":[\"Cybersecurity\",\"Defence &amp; Security\",\"EU News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215\",\"name\":\"Artificial Intelligence: How to make Machine Learning Cyber Secure? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/machine-learning.jpg\",\"datePublished\":\"2021-12-20T02:00:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#primaryimage\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/machine-learning.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/machine-learning.jpg\",\"width\":1280,\"height\":877},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/?p=90215#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Noticias UE\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/category\\\/noticias-ue\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Defensa y Seguridad\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/category\\\/noticias-ue\\\/defensa-seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.cde.ual.es\\\/en\\\/category\\\/eu-news\\\/defence-security\\\/cybersec\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Artificial Intelligence: How to make Machine Learning Cyber Secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#website\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"name\":\"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda\",\"description\":\"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\"},\"alternateName\":\"CDE Almer\u00eda\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cde.ual.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#organization\",\"name\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"contentUrl\":\"https:\\\/\\\/www.cde.ual.es\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/cde-logo-3.png\",\"width\":1400,\"height\":300,\"caption\":\"Centro de Documentaci\u00f3n Europea de Almer\u00eda\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/cdeuniversidadalmeria\\\/\",\"https:\\\/\\\/x.com\\\/cdeualmeria\",\"https:\\\/\\\/www.tiktok.com\\\/@cdealmeria\",\"https:\\\/\\\/www.instagram.com\\\/cdealmeria\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cde-almera-812b26a9\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cde.ual.es\\\/#\\\/schema\\\/person\\\/ee46ebc19edfa19598c02cff83335acc\",\"name\":\"BECA 2 CDE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g\",\"caption\":\"BECA 2 CDE\"},\"sameAs\":[\"http:\\\/\\\/www.cdealmeria.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Intelligence: How to make Machine Learning Cyber Secure? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cde.ual.es\/?p=90215","og_locale":"en_US","og_type":"article","og_title":"Artificial Intelligence: How to make Machine Learning Cyber Secure? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","og_description":"How to prevent machine learning cyberattacks? How to deploy controls without hampering performance? The European Union Agency for Cybersecurity answers the cybersecurity questions of machine learning. Machine learning (ML) is currently the most developed and the most promising subfield of artificial intelligence for industrial and government infrastructures. By providing new opportunities to solve decision-making problems [&hellip;]","og_url":"https:\/\/www.cde.ual.es\/?p=90215","og_site_name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","article_publisher":"https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","article_published_time":"2021-12-20T02:00:24+00:00","og_image":[{"width":1280,"height":877,"url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg","type":"image\/jpeg"}],"author":"BECA 2 CDE","twitter_card":"summary_large_image","twitter_creator":"@cdeualmeria","twitter_site":"@cdeualmeria","twitter_misc":{"Written by":"BECA 2 CDE","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cde.ual.es\/?p=90215#article","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/?p=90215"},"author":{"name":"BECA 2 CDE","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/ee46ebc19edfa19598c02cff83335acc"},"headline":"Artificial Intelligence: How to make Machine Learning Cyber Secure?","datePublished":"2021-12-20T02:00:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cde.ual.es\/?p=90215"},"wordCount":404,"commentCount":0,"publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"image":{"@id":"https:\/\/www.cde.ual.es\/?p=90215#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg","keywords":["cybersecurity","ENISA","Machine Learning"],"articleSection":["Cybersecurity","Defence &amp; Security","EU News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cde.ual.es\/?p=90215#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cde.ual.es\/?p=90215","url":"https:\/\/www.cde.ual.es\/?p=90215","name":"Artificial Intelligence: How to make Machine Learning Cyber Secure? | CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","isPartOf":{"@id":"https:\/\/www.cde.ual.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cde.ual.es\/?p=90215#primaryimage"},"image":{"@id":"https:\/\/www.cde.ual.es\/?p=90215#primaryimage"},"thumbnailUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg","datePublished":"2021-12-20T02:00:24+00:00","breadcrumb":{"@id":"https:\/\/www.cde.ual.es\/?p=90215#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cde.ual.es\/?p=90215"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/?p=90215#primaryimage","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2021\/12\/machine-learning.jpg","width":1280,"height":877},{"@type":"BreadcrumbList","@id":"https:\/\/www.cde.ual.es\/?p=90215#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.cde.ual.es\/en\/"},{"@type":"ListItem","position":2,"name":"Noticias UE","item":"https:\/\/www.cde.ual.es\/category\/noticias-ue\/"},{"@type":"ListItem","position":3,"name":"Defensa y Seguridad","item":"https:\/\/www.cde.ual.es\/category\/noticias-ue\/defensa-seguridad\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity","item":"https:\/\/www.cde.ual.es\/en\/category\/eu-news\/defence-security\/cybersec\/"},{"@type":"ListItem","position":5,"name":"Artificial Intelligence: How to make Machine Learning Cyber Secure?"}]},{"@type":"WebSite","@id":"https:\/\/www.cde.ual.es\/#website","url":"https:\/\/www.cde.ual.es\/","name":"CDE Almer\u00eda - Centro de Documentaci\u00f3n Europea - Universidad de Almer\u00eda","description":"Centro de Documentaci\u00f3n Europea de la Universidad de Almer\u00eda","publisher":{"@id":"https:\/\/www.cde.ual.es\/#organization"},"alternateName":"CDE Almer\u00eda","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cde.ual.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cde.ual.es\/#organization","name":"Centro de Documentaci\u00f3n Europea de Almer\u00eda","url":"https:\/\/www.cde.ual.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","contentUrl":"https:\/\/www.cde.ual.es\/wp-content\/uploads\/2025\/07\/cde-logo-3.png","width":1400,"height":300,"caption":"Centro de Documentaci\u00f3n Europea de Almer\u00eda"},"image":{"@id":"https:\/\/www.cde.ual.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/cdeuniversidadalmeria\/","https:\/\/x.com\/cdeualmeria","https:\/\/www.tiktok.com\/@cdealmeria","https:\/\/www.instagram.com\/cdealmeria\/","https:\/\/www.linkedin.com\/in\/cde-almera-812b26a9\/"]},{"@type":"Person","@id":"https:\/\/www.cde.ual.es\/#\/schema\/person\/ee46ebc19edfa19598c02cff83335acc","name":"BECA 2 CDE","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/35a481bbc04bbd90e91bdfa3b0b5541036c222a49b9ad37b6889a2afcb5311a5?s=96&d=mm&r=g","caption":"BECA 2 CDE"},"sameAs":["http:\/\/www.cdealmeria.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/90192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/users\/101011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/comments?post=90192"}],"version-history":[{"count":0,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/posts\/90192\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media\/90209"}],"wp:attachment":[{"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/media?parent=90192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/categories?post=90192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cde.ual.es\/en\/wp-json\/wp\/v2\/tags?post=90192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}