{"version":"1.0","provider_name":"Grupo de Pesquisa em Redes e Seguran\u00e7a Computacional","provider_url":"https:\/\/coens.dv.utfpr.edu.br\/gprsc","title":"Linhas e Projetos de Pesquisa - Grupo de Pesquisa em Redes e Seguran\u00e7a Computacional","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"J0rBh7bY1H\"><a href=\"https:\/\/coens.dv.utfpr.edu.br\/gprsc\/pesquisa\/\">Linhas e Projetos de Pesquisa<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/coens.dv.utfpr.edu.br\/gprsc\/pesquisa\/embed\/#?secret=J0rBh7bY1H\" width=\"600\" height=\"338\" title=\"&#8220;Linhas e Projetos de Pesquisa&#8221; &#8212; Grupo de Pesquisa em Redes e Seguran\u00e7a Computacional\" data-secret=\"J0rBh7bY1H\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Linhas de Pesquisa Banco de Dados Redes de Computadores Seguran\u00e7a Computacional Sistemas Distribu\u00eddos Sistemas Operacionais Projetos em Andamento Utiliza\u00e7\u00e3o de Mecanismos de Seguran\u00e7a Baseados em Hardware na Experi\u00eancia do Usu\u00e1rio em Jogos Digitais Professor Respons\u00e1vel: Newton Carlos Will An\u00e1lise e Detec\u00e7\u00e3o de\u00a0Ransomwares\u00a0em Sistemas Operacionais\u00a0Desktop Professor Respons\u00e1vel: Newton Carlos Will Utiliza\u00e7\u00e3o de Blockchain em Sistemas de [&hellip;]"}