
{"id":4021,"date":"2017-11-27T17:05:34","date_gmt":"2017-11-27T08:05:34","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?p=4021"},"modified":"2025-12-23T19:51:14","modified_gmt":"2025-12-23T10:51:14","slug":"%ea%b8%88%ec%9d%bc-%eb%8c%80%ed%95%99%ec%9b%90-%ec%88%98%ec%97%85%ec%9d%80-6%ec%8b%9c-30%eb%b6%84%eb%b6%80%ed%84%b0-%ec%8b%9c%ec%9e%91%ed%95%a9%eb%8b%88%eb%8b%a4","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/4021\/","title":{"rendered":"\uae08\uc77c \ub300\ud559\uc6d0 \uc218\uc5c5\uc740 6\uc2dc 30\ubd84\ubd80\ud130 \uc2dc\uc791\ud569\ub2c8\ub2e4."},"content":{"rendered":"<p>17.11.27<br \/>\n\uae08\uc77c \ub300\ud559\uc6d0 \uc218\uc5c5\uc740 \uc624\ud6c4 6\uc2dc 30\ubd84\ubd80\ud130 \uc2dc\uc791\ud569\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>17.11.27 \uae08\uc77c \ub300\ud559\uc6d0 \uc218\uc5c5\uc740 \uc624\ud6c4 6\uc2dc 30\ubd84\ubd80\ud130 \uc2dc\uc791\ud569\ub2c8\ub2e4. &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,64,5,66],"tags":[],"class_list":["post-4021","post","type-post","status-publish","format-standard","hentry","category-2017_2nd_graduate","category-2017_iot_network_system_security","category-lecture","category-notices-1"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/4021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=4021"}],"version-history":[{"count":3,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/4021\/revisions"}],"predecessor-version":[{"id":9636,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/4021\/revisions\/9636"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=4021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=4021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=4021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}