{"id":78731,"date":"2019-03-20T09:58:18","date_gmt":"2019-03-20T09:58:18","guid":{"rendered":"https:\/\/eurecat.org\/?post_type=avada_portfolio&#038;p=78731"},"modified":"2019-04-01T09:55:05","modified_gmt":"2019-04-01T09:55:05","slug":"otiot","status":"publish","type":"avada_portfolio","link":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/","title":{"rendered":"OTIOT"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-two-third fusion-column-first\" style=\"--awb-bg-size:cover;width:65.3333%; margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p><img decoding=\"async\" class=\"alignnone wp-image-78736 size-full\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850.jpg\" alt=\"\" width=\"850\" height=\"447\" srcset=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-200x105.jpg 200w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-300x158.jpg 300w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-400x210.jpg 400w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-600x316.jpg 600w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-768x404.jpg 768w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850-800x421.jpg 800w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_850.jpg 850w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/><\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;width:100%;\"><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\"><\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><p>OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\/IoT (<em>Internet of Things<\/em> y <em>Operational Technology<\/em> por sus siglas en ingl\u00e9s) que permita, de forma automatizada, la detecci\u00f3n de patrones de ataque e identificaci\u00f3n de dispositivos comprometidos, as\u00ed como la posible recuperaci\u00f3n automatizada de datos sensibles filtrados.<\/p>\n<p>Durante el proyecto se estudiar\u00e1 y desarrollar\u00e1 un sistema de despliegue de una red de sensores de dispositivos OT e IoT, as\u00ed como otros sistemas de captaci\u00f3n de informaci\u00f3n de amenazas. Asimismo, se desarrollar\u00e1n tecnolog\u00edas basadas en <em>Big Data <\/em>para el almacenamiento y tratamiento masivo de datos y algoritmos para la extracci\u00f3n de inteligencia a partir de la informaci\u00f3n relacionada entre actores de amenazas y grupos cibercriminales.<\/p>\n<p>El sistema OTIOT, que ser\u00e1 validado en las instalaciones de Blueliv y Eurecat, permitir\u00e1 la implementaci\u00f3n de estrategias de defensas efectivas para superar los retos de seguridad que se plantean a ra\u00edz de la introducci\u00f3n de entornos IoT e OT interconectados y posibilitar\u00e1 la extensi\u00f3n del motor de producto de Blueliv para procesar malware y URLs maliciosas.<\/p>\n<p>El proyecto, liderado por <a href=\"https:\/\/www.blueliv.com\/\">Blueliv<\/a>, cuenta con la participaci\u00f3n de Eurecat a trav\u00e9s de la <a href=\"https:\/\/eurecat.org\/es\/ambitos-de-conocimiento\/it-ot-security\/\">Unidad Tecnol\u00f3gica de IT-Security<\/a>. Eurecat colabora en el proyecto en la aplicaci\u00f3n de sistemas basados en inteligencia artificial, as\u00ed como en la definici\u00f3n de nuevos algoritmos de inteligencia para la automatizaci\u00f3n de la gesti\u00f3n de la seguridad, de vital necesidad e importancia para afrontar los riesgos inherentes en los sistemas OT\/IoT del presente y del futuro.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;width:30.6666%;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-2 fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:20px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Datos generales<\/h3><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3\"><p><strong>Proyecto<\/strong><\/p>\n<p>OTIOT \u2013 Sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-4\"><p><strong>Referencia proyecto<\/strong><\/p>\n<p>RTC-2017-6175-7<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-text fusion-text-5\"><p><strong>Programa y convocatoria<\/strong><\/p>\n<p>Proyecto financiado por el MINISTERIO DE CIENCIA, INNOVACI\u00d3N Y UNIVERSIDADES y por la Uni\u00f3n Europea, en el marco de la convocatoria Retos-Colaboraci\u00f3n del Programa Estatal de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n Orientada a los Retos de la Sociedad, dentro del Plan Estatal de Investigaci\u00f3n Cient\u00edfica y T\u00e9cnica y de Innovaci\u00f3n 2013-2016, con el objetivo principal de promover el desarrollo tecnol\u00f3gico, la innovaci\u00f3n y una investigaci\u00f3n de calidad.<\/p>\n<\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"margin-left: auto;margin-right: auto;margin-top:0px;margin-bottom:10px;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:#e0dede;border-top-width:1px;\"><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"60\" title=\"LOGO_MCIU_Gob_Web_AEI_low\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-300x60.jpg\" alt class=\"img-responsive wp-image-79193\" srcset=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-200x40.jpg 200w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-400x80.jpg 400w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-600x120.jpg 600w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1-800x160.jpg 800w, https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/LOGO_MCIU_Gob_Web_AEI_low-1.jpg 1000w\" sizes=\"(max-width: 800px) 100vw, 600px\" \/><\/span><\/div><\/div><div class=\"fusion-image-element fusion-image-align-center in-legacy-container\" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><div class=\"imageframe-align-center\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"150\" height=\"150\" alt=\"FEDER\" title=\"FEDER RETOS\" src=\"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/10\/FEDER-RETOS-150x150.png\" class=\"img-responsive wp-image-72884\" srcset=\"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/10\/FEDER-RETOS-66x66.png 66w, https:\/\/eurecat.org\/wp-content\/uploads\/2018\/10\/FEDER-RETOS-150x150.png 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/span><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":20,"featured_media":78739,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"portfolio_category":[1570,1435],"portfolio_skills":[1584,1588],"portfolio_tags":[],"class_list":["post-78731","avada_portfolio","type-avada_portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-it-security-es","portfolio_category-proyectos-nacionales-es","portfolio_skills-feder-es","portfolio_skills-retos-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OTIOT \u2013 Monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT<\/title>\n<meta name=\"description\" content=\"OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\/IoT que permita, de forma automatizada, la detecci\u00f3n de patrones ...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OTIOT \u2013 Monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT\" \/>\n<meta property=\"og:description\" content=\"OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\/IoT que permita, de forma automatizada, la detecci\u00f3n de patrones ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurecat\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-01T09:55:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"520\" \/>\n\t<meta property=\"og:image:height\" content=\"272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/\",\"url\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/\",\"name\":\"OTIOT \u2013 Monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/OTIOT_520.jpg\",\"datePublished\":\"2019-03-20T09:58:18+00:00\",\"dateModified\":\"2019-04-01T09:55:05+00:00\",\"description\":\"OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\\\/IoT que permita, de forma automatizada, la detecci\u00f3n de patrones ...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/OTIOT_520.jpg\",\"contentUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/OTIOT_520.jpg\",\"width\":520,\"height\":272},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/otiot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inici\",\"item\":\"https:\\\/\\\/eurecat.org\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proyectos\",\"item\":\"https:\\\/\\\/eurecat.org\\\/es\\\/portfolio-items\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OTIOT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/eurecat.org\\\/es\\\/\",\"name\":\"Eurecat\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eurecat.org\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OTIOT \u2013 Monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT","description":"OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\/IoT que permita, de forma automatizada, la detecci\u00f3n de patrones ...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/","og_locale":"es_ES","og_type":"article","og_title":"OTIOT \u2013 Monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT","og_description":"OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\/IoT que permita, de forma automatizada, la detecci\u00f3n de patrones ...","og_url":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/","og_site_name":"Eurecat","article_modified_time":"2019-04-01T09:55:05+00:00","og_image":[{"width":520,"height":272,"url":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/","url":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/","name":"OTIOT \u2013 Monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos IoT e OT","isPartOf":{"@id":"https:\/\/eurecat.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/#primaryimage"},"image":{"@id":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","datePublished":"2019-03-20T09:58:18+00:00","dateModified":"2019-04-01T09:55:05+00:00","description":"OTIOT desarrolla un sistema de monitorizaci\u00f3n y detecci\u00f3n de amenazas en entornos OT\/IoT que permita, de forma automatizada, la detecci\u00f3n de patrones ...","breadcrumb":{"@id":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/#primaryimage","url":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","contentUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2019\/03\/OTIOT_520.jpg","width":520,"height":272},{"@type":"BreadcrumbList","@id":"https:\/\/eurecat.org\/es\/portfolio-items\/otiot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inici","item":"https:\/\/eurecat.org\/es\/"},{"@type":"ListItem","position":2,"name":"Proyectos","item":"https:\/\/eurecat.org\/es\/portfolio-items\/"},{"@type":"ListItem","position":3,"name":"OTIOT"}]},{"@type":"WebSite","@id":"https:\/\/eurecat.org\/es\/#website","url":"https:\/\/eurecat.org\/es\/","name":"Eurecat","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eurecat.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/avada_portfolio\/78731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/avada_portfolio"}],"about":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/types\/avada_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/comments?post=78731"}],"version-history":[{"count":0,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/avada_portfolio\/78731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/media\/78739"}],"wp:attachment":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/media?parent=78731"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/portfolio_category?post=78731"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/portfolio_skills?post=78731"},{"taxonomy":"portfolio_tags","embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/portfolio_tags?post=78731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}