{"id":34405,"date":"2020-03-23T09:38:09","date_gmt":"2020-03-23T09:38:09","guid":{"rendered":"https:\/\/virtual-campus.eu\/alien\/problems\/identification-of-security-requirements-through-misuse-cases\/"},"modified":"2020-05-13T09:01:09","modified_gmt":"2020-05-13T09:01:09","slug":"identification-of-security-requirements-through-misuse-cases","status":"publish","type":"problem","link":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/problems\/identification-of-security-requirements-through-misuse-cases\/","title":{"rendered":"Identification of Security Requirements through Misuse-cases"},"content":{"rendered":"<p>to identify the security requirements with the help of misuse cases.<\/p>","protected":false},"excerpt":{"rendered":"<p>to identify the security requirements with the help of misuse cases.<\/p>","protected":false},"author":155,"featured_media":34442,"template":"","categories":[388],"tags":[764,763,748],"_links":{"self":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/problem\/34405"}],"collection":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/problem"}],"about":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/types\/problem"}],"author":[{"embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/users\/155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/media\/34442"}],"wp:attachment":[{"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/media?parent=34405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/categories?post=34405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alien-pbl.fsktm.um.edu.my\/el\/wp-json\/wp\/v2\/tags?post=34405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}