{"id":8062,"date":"2020-09-18T13:58:24","date_gmt":"2020-09-18T18:58:24","guid":{"rendered":"https:\/\/blogs.tntech.edu\/techtimes\/?p=8062"},"modified":"2020-09-18T13:58:24","modified_gmt":"2020-09-18T18:58:24","slug":"csc-grad-student-club-research-seminar-sept-21","status":"publish","type":"post","link":"https:\/\/blogs.tntech.edu\/techtimes\/2020\/student-orgs\/csc-grad-student-club-research-seminar-sept-21\/","title":{"rendered":"CSC Grad Student Club Research Seminar Sept. 21"},"content":{"rendered":"<p>The Computer Science Graduate Student Club is going to organize its second research seminar on Mon, Sept. 21 from 2:30 \u2013 3:30 PM (CST). Rob Gillen, CSC Ph.D. Candidate, is going to talk about \u201cMethod for Accessing Security Impact of Settings in Anomaly-Based Intrusion Detection for Industrial Control Systems.\u201d Join us over the following Zoom session \u2013<\/p>\n<p>&nbsp;<\/p>\n<p>Zoom Link: <a href=\"https:\/\/tntech.zoom.us\/j\/97675535436?pwd=RWtUVHZwNlZGVHFlbmZaK2pLSCtKZz09\" rel=\"noopener noreferrer\">https:\/\/tntech.zoom.us\/j\/97675535436?pwd=RWtUVHZwNlZGVHFlbmZaK2pLSCtKZz09<\/a><br \/>\nMeeting ID: 976 7553 5436<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Computer Science Graduate Student Club is going to organize its second research seminar on Mon, Sept. 21 from 2:30 \u2013 3:30 PM (CST). Rob Gillen, CSC Ph.D. Candidate, is going to talk about \u201cMethod for Accessing Security Impact of Settings in Anomaly-Based Intrusion Detection for Industrial Control Systems.\u201d Join us over the following Zoom [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8063,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[20],"tags":[23,24,22],"class_list":{"0":"post-8062","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-student-orgs","8":"tag-facstaff","9":"tag-rs","10":"tag-student"},"jetpack_featured_media_url":"https:\/\/blogs.tntech.edu\/techtimes\/wp-content\/uploads\/sites\/8\/2020\/09\/2020-09-18_5f64d3732ab51_Rob_Presentation_Banner_09-21.jpg","_links":{"self":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts\/8062","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/comments?post=8062"}],"version-history":[{"count":1,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts\/8062\/revisions"}],"predecessor-version":[{"id":8071,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/posts\/8062\/revisions\/8071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/media\/8063"}],"wp:attachment":[{"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/media?parent=8062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/categories?post=8062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.tntech.edu\/techtimes\/wp-json\/wp\/v2\/tags?post=8062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}