<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Ram Krishnan</provider_name><provider_url>https://ceid.utsa.edu/rkrishnan</provider_url><author_name>rkrishnan</author_name><author_url>https://ceid.utsa.edu/rkrishnan/author/rkrishnan/</author_url><title>Prospective Students - Ram Krishnan</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Ae27WCgsiw"&gt;&lt;a href="https://ceid.utsa.edu/rkrishnan/prospective-students/"&gt;Prospective Students&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://ceid.utsa.edu/rkrishnan/prospective-students/embed/#?secret=Ae27WCgsiw" width="600" height="338" title="&#x201C;Prospective Students&#x201D; &#x2014; Ram Krishnan" data-secret="Ae27WCgsiw" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://ceid.utsa.edu/rkrishnan/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>The Institute for Cyber Security (ICS) conducts research in fundamental and applied aspects of cybersecurity. In particular, ICS members work on machine learning security and privacy, malware detection using machine learning techniques and foundational aspects of authorization in information systems in the context of technology domains such as Cloud Computing, Internet of Things, Mobile Computing &hellip; Continue reading ""</description></oembed>
