{"id":546,"date":"2025-12-04T12:09:02","date_gmt":"2025-12-04T11:09:02","guid":{"rendered":"https:\/\/www.stagcyber.fr\/videotheque\/"},"modified":"2025-12-09T10:40:53","modified_gmt":"2025-12-09T09:40:53","slug":"videotheque","status":"publish","type":"page","link":"https:\/\/www.stagcyber.fr\/fr\/videotheque\/","title":{"rendered":"Vid\u00e9oth\u00e8que"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"546\" class=\"elementor elementor-546 elementor-340\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e083046 e-flex e-con-boxed e-con e-parent\" data-id=\"e083046\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0180b1c elementor-widget elementor-widget-heading\" data-id=\"0180b1c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Autonomous Intelligent Agents in Cyber Offence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e99468 elementor-widget elementor-widget-text-editor\" data-id=\"2e99468\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Pr\u00e9sentation \u00e0 la 5\u00e8me conf\u00e9rence internationale sur les cyberconflits (CyCon) &#8211; Tallinn, 6 juin 2012<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-615ad75 elementor-widget elementor-widget-video\" data-id=\"615ad75\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=zjdLpgDt-4k&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa6e13b e-flex e-con-boxed e-con e-parent\" data-id=\"fa6e13b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e0d3f48 elementor-widget elementor-widget-heading\" data-id=\"e0d3f48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">La g\u00e9opolitique de l'IA<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be8d610 elementor-widget elementor-widget-text-editor\" data-id=\"be8d610\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Pr\u00e9sentation \u00e0 la conf\u00e9rence Pirate Security, Munich 2017<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4982d1d elementor-widget elementor-widget-video\" data-id=\"4982d1d\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=odjiITmnMvA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Autonomous Intelligent Agents in Cyber Offence Pr\u00e9sentation \u00e0 la 5\u00e8me conf\u00e9rence internationale sur les cyberconflits (CyCon) &#8211; Tallinn, 6 juin 2012 https:\/\/www.youtube.com\/watch?v=zjdLpgDt-4k La g\u00e9opolitique de l&rsquo;IA [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-546","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages\/546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/comments?post=546"}],"version-history":[{"count":3,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages\/546\/revisions"}],"predecessor-version":[{"id":550,"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/pages\/546\/revisions\/550"}],"wp:attachment":[{"href":"https:\/\/www.stagcyber.fr\/fr\/wp-json\/wp\/v2\/media?parent=546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}