{"id":86,"date":"2018-09-25T11:52:11","date_gmt":"2018-09-25T11:52:11","guid":{"rendered":"http:\/\/users.utu.fi\/shohos\/?page_id=86"},"modified":"2018-09-27T10:44:18","modified_gmt":"2018-09-27T10:44:18","slug":"about","status":"publish","type":"page","link":"https:\/\/users.utu.fi\/shohos\/","title":{"rendered":""},"content":{"rendered":"<figure id=\"attachment_14\" aria-describedby=\"caption-attachment-14\" style=\"width: 184px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14\" src=\"https:\/\/users.utu.fi\/shohos\/wp-content\/uploads\/sites\/83\/2016\/09\/df951a47a7183810506779e606f51aa8666617f8131a065df8c707a85dee7740-224x300.jpg\" alt=\"\" width=\"184\" height=\"246\" srcset=\"https:\/\/users.utu.fi\/shohos\/wp-content\/uploads\/sites\/83\/2016\/09\/df951a47a7183810506779e606f51aa8666617f8131a065df8c707a85dee7740-224x300.jpg 224w, https:\/\/users.utu.fi\/shohos\/wp-content\/uploads\/sites\/83\/2016\/09\/df951a47a7183810506779e606f51aa8666617f8131a065df8c707a85dee7740-768x1028.jpg 768w, https:\/\/users.utu.fi\/shohos\/wp-content\/uploads\/sites\/83\/2016\/09\/df951a47a7183810506779e606f51aa8666617f8131a065df8c707a85dee7740-765x1024.jpg 765w, https:\/\/users.utu.fi\/shohos\/wp-content\/uploads\/sites\/83\/2016\/09\/df951a47a7183810506779e606f51aa8666617f8131a065df8c707a85dee7740.jpg 956w\" sizes=\"auto, (max-width: 184px) 100vw, 184px\" \/><figcaption id=\"caption-attachment-14\" class=\"wp-caption-text\">Doctoral Student, <br \/>University of Turku, Finland<\/figcaption><\/figure>\n<hr \/>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4><\/h4>\n<h4><\/h4>\n<hr \/>\n<h4><strong>Education<\/strong><\/h4>\n<ul>\n<li>Doctor of Philosophy (Ph.D.) in System and Software Security<\/li>\n<li>Master of Science (M.Sc.) in Information Technology- Network Security<\/li>\n<li>Bachelor of Science (B.Sc.) in Computer Software Engineering<\/li>\n<\/ul>\n<h4><strong>Research Interests<\/strong><\/h4>\n<ul>\n<li>Security in Cloud Computing<\/li>\n<li>Security in Internet of Things (IoT)<\/li>\n<li>Trusted Computing and Trusted Execution Environments<\/li>\n<li>Software, Network, and Platform Security<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Education Doctor of Philosophy (Ph.D.) in System and Software Security Master of Science (M.Sc.) in Information Technology- Network Security Bachelor of Science (B.Sc.) in Computer Software Engineering Research Interests Security in Cloud Computing Security in Internet of Things (IoT) Trusted Computing and Trusted Execution Environments Software, Network, and Platform Security<\/p>\n","protected":false},"author":95,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-86","page","type-page","status-publish","czr-hentry"],"_links":{"self":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages\/86","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":39,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages\/86\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/pages\/86\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/users.utu.fi\/shohos\/wp-json\/wp\/v2\/media?parent=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}