{"id":3355,"date":"2017-04-07T07:11:35","date_gmt":"2017-04-07T07:11:35","guid":{"rendered":"http:\/\/kaf-pe.kpi.ua\/?p=3355"},"modified":"2017-04-07T07:11:35","modified_gmt":"2017-04-07T07:11:35","slug":"%d0%bb%d0%b5%d0%ba%d1%86%d1%96%d1%8f-%d0%b2%d0%b8%d0%ba%d0%bb%d0%b0%d0%b4%d0%b0%d1%87%d0%b0-%d0%b7-%d1%83%d0%bd%d1%96%d0%b2%d0%b5%d1%80%d1%81%d0%b8%d1%82%d0%b5%d1%82%d1%83-%d0%bc-%d0%bb%d1%8e%d0%ba","status":"publish","type":"post","link":"https:\/\/eds.kpi.ua\/?p=3355","title":{"rendered":"\u041b\u0435\u043a\u0446\u0456\u044f \u0432\u0438\u043a\u043b\u0430\u0434\u0430\u0447\u0430 \u0437 \u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u043c. \u041b\u044e\u043a\u0441\u0435\u043c\u0431\u0443\u0440\u0433"},"content":{"rendered":"<div dir=\"ltr\">\u0428\u0430\u043d\u043e\u0432\u043d\u0456 \u043a\u043e\u043b\u0435\u0433\u0438!<\/div>\n<div dir=\"ltr\">\u0417\u0430\u043f\u0440\u043e\u0448\u0443\u0454\u043c\u043e \u0432\u0430\u0441 13 \u043a\u0432\u0456\u0442\u043d\u044f \u043e 14:30 \u043d\u0430 \u043b\u0435\u043a\u0446\u0456\u044e Dr. Andriy Panchenko \u0437\u00a0\u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u043c. \u041b\u044e\u043a\u0441\u0435\u043c\u0431\u0443\u0440\u0433 \u043d\u0430 \u0442\u0435\u043c\u0443 &#8220;Fingerprinting Techniques for Network Security&#8221;.<\/div>\n<div dir=\"ltr\">\u041c\u0456\u0441\u0446\u0435 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0437\u0430\u0445\u043e\u0434\u0443: 12 \u043a\u043e\u0440\u043f\u0443\u0441, 412 \u0430\u0443\u0434\u0438\u0442\u043e\u0440\u0456\u044f.<\/div>\n<div dir=\"ltr\">\u0414\u0435\u0442\u0430\u043b\u044c\u043d\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f \u043d\u0430 \u0441\u0430\u0439\u0442\u0456: <a href=\"http:\/\/mobilnist.kpi.ua\/title-dr-andriy-panchenko\/\" target=\"_blank\">http:\/\/mobilnist.kpi.ua\/title-dr-andriy-panchenko\/<\/a><\/div>\n<div dir=\"ltr\">\u041e\u0431\u043e\u0432&#8217;\u044f\u0437\u043a\u043e\u0432\u0430 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044f \u0440\u0435\u0454\u0441\u0442\u0440\u0430\u0446\u0456\u044f &#8211; <a href=\"https:\/\/goo.gl\/forms\/ULDFi2erpbqFj5AH3\" target=\"_blank\">https:\/\/goo.gl\/forms\/ULDFi2erpbqFj5AH3<\/a><\/div>\n<div dir=\"ltr\"><\/div>\n<div dir=\"ltr\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u0428\u0430\u043d\u043e\u0432\u043d\u0456 \u043a\u043e\u043b\u0435\u0433\u0438! \u0417\u0430\u043f\u0440\u043e\u0448\u0443\u0454\u043c\u043e \u0432\u0430\u0441 13 \u043a\u0432\u0456\u0442\u043d\u044f \u043e 14:30 \u043d\u0430 \u043b\u0435\u043a\u0446\u0456\u044e Dr. Andriy Panchenko \u0437\u00a0\u0423\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u043c. \u041b\u044e\u043a\u0441\u0435\u043c\u0431\u0443\u0440\u0433 \u043d\u0430 \u0442\u0435\u043c\u0443 &#8220;Fingerprinting Techniques for Network Security&#8221;. \u041c\u0456\u0441\u0446\u0435 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0437\u0430\u0445\u043e\u0434\u0443: 12 \u043a\u043e\u0440\u043f\u0443\u0441, 412 \u0430\u0443\u0434\u0438\u0442\u043e\u0440\u0456\u044f. \u0414\u0435\u0442\u0430\u043b\u044c\u043d\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044f \u043d\u0430 \u0441\u0430\u0439\u0442\u0456: http:\/\/mobilnist.kpi.ua\/title-dr-andriy-panchenko\/ \u041e\u0431\u043e\u0432&#8217;\u044f\u0437\u043a\u043e\u0432\u0430 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044f \u0440\u0435\u0454\u0441\u0442\u0440\u0430\u0446\u0456\u044f &#8211; https:\/\/goo.gl\/forms\/ULDFi2erpbqFj5AH3<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-3355","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=\/wp\/v2\/posts\/3355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3355"}],"version-history":[{"count":1,"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=\/wp\/v2\/posts\/3355\/revisions"}],"predecessor-version":[{"id":3356,"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=\/wp\/v2\/posts\/3355\/revisions\/3356"}],"wp:attachment":[{"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eds.kpi.ua\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}