{"id":611,"date":"2025-05-01T19:18:16","date_gmt":"2025-05-01T10:18:16","guid":{"rendered":"https:\/\/fw.is.tohoku.ac.jp\/?post_type=papers&#038;p=611"},"modified":"2025-06-04T19:05:58","modified_gmt":"2025-06-04T10:05:58","slug":"harvesting-and-threat-aware-security-configuration-strategy-for-ieee-802-15-4-based-iot-networks","status":"publish","type":"papers","link":"https:\/\/fw.is.tohoku.ac.jp\/en\/papers\/611\/","title":{"rendered":"Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks"},"content":{"rendered":"","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":true,"wp-seo-meta-description":"","wp-seo-meta-robots":[]},"paper-cat":[20],"class_list":{"0":"post-611","1":"papers","2":"type-papers","3":"status-publish","5":"paper-cat-journal","6":"c-entry"},"acf":[],"_links":{"self":[{"href":"https:\/\/fw.is.tohoku.ac.jp\/en\/wp-json\/wp\/v2\/papers\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fw.is.tohoku.ac.jp\/en\/wp-json\/wp\/v2\/papers"}],"about":[{"href":"https:\/\/fw.is.tohoku.ac.jp\/en\/wp-json\/wp\/v2\/types\/papers"}],"wp:attachment":[{"href":"https:\/\/fw.is.tohoku.ac.jp\/en\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"paper-cat","embeddable":true,"href":"https:\/\/fw.is.tohoku.ac.jp\/en\/wp-json\/wp\/v2\/paper-cat?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}