{"id":1183,"date":"2018-01-27T20:42:03","date_gmt":"2018-01-27T11:42:03","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=1183"},"modified":"2025-11-19T08:52:12","modified_gmt":"2025-11-18T23:52:12","slug":"invited-talks","status":"publish","type":"page","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=1183","title":{"rendered":"Invited Talks"},"content":{"rendered":"<h2>2025<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;Beyond Reaction: Proactive Cyber Threat Intelligence with Graph Neural Networks and MITRE ATT&amp;CK&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc81c17\ud68c CPS \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2025\/10\/16<\/li>\n<\/ol>\n<h2>2024<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;Optimal Frequency Range Exploration for Acoustic Signal Air-Gap Attacks&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc81c15\ud68c CPS \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2024\/10\/10<\/li>\n<li>\uc774\uc885\ud601, &#8220;ARP Spoofing Attack on the E2 Interface in Open RAN&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc81c14\ud68c CPS \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2024\/05\/30<\/li>\n<\/ol>\n<h2>2023<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;Air-gap Jumping: Utilizing a Gyroscope&#8221;, ICT\ud50c\ub7ab\ud3fc\ud559\ud68c 2023 AI.\ubcf4\uc548\uae30\uc220\uc138\ubbf8\ub098, 2023\/07\/27<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ubaa8\ubc14\uc77c \uc2e0\ubd84\uc99d \ubbfc\uac04 \uc5f0\uacc4\uc5d0 \ub530\ub978 \uace0\ub824\uc0ac\ud56d&#8221;, NetSec-KR 2023 \uc81c29\ud68c \uc815\ubcf4\ud1b5\uc2e0\ub9dd \uc815\ubcf4\ubcf4\ud638 \ucee8\ud37c\ub7f0\uc2a4, 2023\/04\/21<\/li>\n<\/ol>\n<h2>2021<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;\uc2a4\ub9c8\ud2b8\ud329\ud1a0\ub9ac\uc5d0\uc11c\uc758 \ube14\ub85d\uccb4\uc778&#8221;, \uc81c3\ud68c \ucc28\uc138\ub300\uc778\ud504\ub77c \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2021\/07\/09<\/li>\n<\/ol>\n<h2>2020<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;\ub9c9\uc4f0\ub294 \ub3c4\ucee4 \ucee8\ud14c\uc774\ub108, \uc870\uae08\uc774\ub77c\ub3c4 \uc548\uc804\ud558\uac8c \uc4f0\uc790! &#8211; \ub9c8\uc774\ud06c\ub85c\uc11c\ube44\uc2a4\uc640 \ubcf4\uc548 \uc774\uc288&#8221;, 2020 \ubbf8\ub798\uc735\ud569\ubcf4\uc548\uae30\uc220\uc6cc\ud06c\uc20d, 2020\/08\/04<\/li>\n<\/ol>\n<h2>2019<\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;\ud655\uc7a5\uc131 \uc774\uc288: \uc774\ub354\ub9ac\uc6c0 \uc624\ud504\uccb4\uc778 \uc194\ub8e8\uc158 \uc911\uc2ec\uc73c\ub85c&#8221;, \ub300\ud55c\uc804\uc790\uacf5\ud559\ud68c \ube14\ub85d\uccb4\uc778\uc73c\ub85c \uc5ec\ub294 \ubbf8\ub798\uc0ac\ud68c \uc6cc\ud06c\uc20d, 2019\/06\/17<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \uae30\uc220&#8221;, SBS \ubbf8\ub514\uc5b4\uae30\uc220\uc5f0\uad6c\uc18c, 2019\/04\/24<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \ud655\uc7a5\uc131 \uc774\uc288&#8221;, TTA \ube14\ub85d\uccb4\uc778 \uae30\uc220 \ubc0f \ud45c\uc900 \ubc1c\uc804\ubc29\ud5a5 \uc138\ubbf8\ub098, 2019\/04\/17<\/li>\n<\/ol>\n<h2><strong>2018<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;IoT\ub97c \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\uc220&#8221;, TTA \uc544\uce74\ub370\ubbf8 IoT \ud45c\uc900 \uae30\uc220 \uc138\ubbf8\ub098, 2018\/11\/27<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ubc29\uc1a1\ucf58\ud150\uce20\uc640 \ube14\ub85d\uccb4\uc778&#8221;, \ub514\uc9c0\ucea1(\uc8fc), 2018\/11\/23<\/li>\n<li>\uc774\uc885\ud601,\u00a0 &#8220;DIN(Decentralized Internet Infrastructure)&#8221;, IETF \ubbf8\ub7ec\ud3ec\ub7fc \uc6cc\ud06c\uc20d, 2018\/10\/22<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778\uacfc \uc5d0\ub108\uc9c0 \uc0b0\uc5c5&#8221;, \ud55c\uad6d\uc804\ub825\uac70\ub798\uc18c(Korea Power Exchange), 2018\/10\/01<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \ubcf4\uc548&#8221;, \uc81c36\ud68c \ubbf8\ub798 \uc815\ubcf4 \uae30\uc220\/\uc0b0\uc5c5 \uc804\ub9dd (iTIP-2018), 2018\/09\/14<\/li>\n<li>\uc774\uc885\ud601, \u201c\ube14\ub85d\uccb4\uc778 \ubcf4\uc548\u201d, 2018\ub144\ub3c4 \ud55c\uad6d\uc815\ubcf4\uacfc\ud559\ud68c \uc815\ubcf4\ubcf4\uc548 \ubc0f \uace0\uc2e0\ub8b0\ucef4\ud4e8\ud305 \ud558\uacc4\uc6cc\ud06c\uc0f5 (WDSC2018), 2018\/08\/16<\/li>\n<li>\uc774\uc885\ud601, \u201c\ube14\ub85d\uccb4\uc778 \ud569\uc758 \uc54c\uace0\ub9ac\uc998\u201d, \ud55c\uad6d\uc815\ubcf4\uacfc\ud559\ud68c \ub370\uc774\ud130\ubca0\uc774\uc2a4\uc18c\uc0ac\uc774\uc5b4\ud2f0 2018\ub144 \uc5ec\ub984\ud559\uad50, 2018\/07\/26<\/li>\n<li>\uc774\uc885\ud601, \u201c\ucf58\ud150\uce20 \uc720\ud1b5 \ud65c\uc131\ud654\ub97c \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\ubc18 \uad6d\uac00\ub514\uc9c0\ud138\ucf58\ud150\uce20 \uc2dd\ubcc4\uccb4\uacc4(UCI) \ud65c\uc6a9\u201d, TTA PG222 \uc81c30\ucc28 \uc815\uae30\ud68c\uc758 \ubc0f \uc6cc\ud06c\uc20d, 2018\/07\/25<\/li>\n<li>\uc774\uc885\ud601, \u201c\uba54\ubaa8\ub9ac \uacf5\uaca9\uacfc \ubc29\uc5b4 \uae30\ubc95\uc758 \ubcc0\ud654\u201d, CodeEngn Conference 15, 2018\/07\/07<\/li>\n<li>\uc774\uc885\ud601, \u201c\ube14\ub85d\uccb4\uc778 \ub3d9\uc791 \uc6d0\ub9ac\uc640 \uc694\uc18c \uae30\uc220\u201d, KRnet 2018, 2018\/06\/25<\/li>\n<li>\uc774\uc885\ud601, \u201c\ube14\ub85d\uccb4\uc778: \uc774\ub354\ub9ac\uc6c0 \ud50c\ub7ab\ud3fc \ubd84\uc11d\u201d, 8th CSMS \uc735\ud569\/\uc2a4\ub9c8\ud2b8\ubbf8\ub514\uc5b4 \uc2dc\uc2a4\ud15c \uc6cc\ud06c\uc0f5, 2018\/06\/18<\/li>\n<li>\uc774\uc885\ud601, \u201c\ube14\ub85d\uccb4\uc778 \ud569\uc758 \uc54c\uace0\ub9ac\uc998\u201d, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c 2018\ub144\ub3c4 \uc81c1 \ucc28 \ub2e8\uae30\uac15\uc88c, 2018\/03\/22<\/li>\n<li>\uc774\uc885\ud601, &#8220;\uc774\ub354\ub9ac\uc6c0 \ube14\ub85d\uccb4\uc778 \ud504\ub85c\ud1a0\ucf5c \ubd84\uc11d&#8221;, 2018\ub144\ub3c4 \ud55c\uad6d\ud1b5\uc2e0\ud559\ud68c \ub3d9\uacc4\uc885\ud569\ud559\uc220\ubc1c\ud45c\ud68c \ud29c\ud1a0\ub9ac\uc5bc, 2018\/01\/18<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778\uacfc \uc554\ud638\ud654\ud3d0&#8221;, \uc6d0\uad11\ub300\ud559\uad50 \uc0b0\ud559\ud611\ub825 \uc6cc\ud06c\uc20d, 2018\/01\/12<\/li>\n<\/ol>\n<h2><strong>2017<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;Brief Introduction of Anonymous Cryptocurrencies&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c CPS \ubcf4\uc548 \uc5f0\uad6c\ud68c, 2017\/12\/21<\/li>\n<li>\uc774\uc885\ud601, &#8220;The Software Updates for Internet of Things (SUIT) BoF: IETF 100 Meeting Report&#8221;, TTA PG222, 2017\/12\/05<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778\uc758 \ub3d9\uc791 \uc6d0\ub9ac\uc640 \uc694\uc18c \uae30\uc220 \uc18c\uac1c&#8221;, 2017\ub144 \uc81c 4\ucc28 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ub2e8\uae30\uac15\uc88c, 2017\/12\/01<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ud074\ub77c\uc6b0\ub4dc \uae30\ubc18 \ube14\ub85d\uccb4\uc778&#8221;, \uae00\ub85c\ubc8c ICT \ud45c\uc900 \ucee8\ud37c\ub7f0\uc2a4 (GISC 2017), 2017\/11\/28<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778\uc758 \ub3d9\uc791 \uc6d0\ub9ac\uc640 \uc694\uc18c \uae30\uc220 \uc18c\uac1c&#8221;, 2017\ub144 \ud55c\uad6d\uc815\ubcf4\ucc98\ub9ac\ud559\ud68c \ucd94\uacc4\ud559\uc220\ubc1c\ud45c\ub300\ud68c \ud29c\ud1a0\ub9ac\uc5bc, 2017\/11\/03<\/li>\n<li>\uc774\uc885\ud601, &#8220;How Can Blockchains Help Industrial Control Systems Security?&#8221;, \uc815\ubcf4\ubcf4\ud638\uc640 \uc554\ud638\uc5d0 \uad00\ud55c \ud559\uc220\ub300\ud68c (WISC), 2017\/09\/21<\/li>\n<li>\uc774\uc885\ud601, &#8220;Blockchain Explained with Application Examples&#8221;, \ud64d\uc775\ub300, 2017\/09\/15<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \uae30\uc220\uacfc \uc751\uc6a9&#8221;, \uae30\uac00\ucf54\ub9ac\uc544\uc0ac\uc5c5\ub2e8, 2017\/08\/29<\/li>\n<li>\uc774\uc885\ud601, \uc774\ubd80\ud615, &#8220;\uc774\ub354\ub9ac\uc6c0 \uc18c\uac1c \ubc0f \uc0ac\uc6a9\ubc95&#8221;, \ub514\uc9c0\ucea1, 2017\/08\/11<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \uae30\uc220\uacfc \uc751\uc6a9&#8221;, \ub514\uc9c0\ucea1, 2017\/08\/11<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \uae30\uc220\uacfc \uc751\uc6a9&#8221;, CSMS \uc6cc\ud06c\uc20d, 2017\/07\/13<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778\uacfc \ucee8\uc13c\uc11c\uc2a4 \uc54c\uace0\ub9ac\uc998&#8221;, TTA PG222, 2017\/07\/11<\/li>\n<li>\uc774\uc885\ud601, &#8220;WannaCry \ub79c\uc12c\uc6e8\uc5b4 \ubd84\uc11d&#8221;, \uad6d\ubbfc\ub300\ud559\uad50, 2017\/06\/27<\/li>\n<li>\uc774\uc885\ud601, &#8220;NSA Exploits \uacfc ICS \ubcf4\uc548: Rise of State-Sponsored Hacking&#8221;, \uc5d0\ub108\uc9c0 \uc0ac\uc774\ubc84\ubcf4\uc548 \uc6cc\ud06c\uc20d, 2017\/06\/09<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \uae30\uc220\uacfc \uae30\ubc18\uc2dc\uc124&#8221;, \uae30\ubc18\uc2dc\uc124\ubcf4\ud638\uc5f0\uad6c\ud68c, 2017\/04\/13<\/li>\n<li>\uc774\uc885\ud601, &#8220;Blockchain: \uac1c\ub150\uacfc \uc694\uc18c \uae30\uc220&#8221;, SK \ube0c\ub85c\ub4dc\ubc34\ub4dc, 2017\/03\/31<\/li>\n<li>\uc774\uc885\ud601, &#8220;Blockchain: Short Intro. Of Proof of Work&#8221;, \uc131\uade0\uad00\ub300\ud559\uad50, 2017\/03\/22<\/li>\n<li>\uc774\uc885\ud601, &#8220;5G \uc735\ud569\uc11c\ube44\uc2a4\ub97c \uc704\ud55c \ube14\ub85d\uccb4\uc778 \uae30\uc220\ud604\ud669&#8221;, 5G \uc804\ub7b5\ucd94\uc9c4\uc704\uc6d0\ud68c \uae30\uc220\u00b7\ud45c\uc900\ud654\ubd84\uacfc \ud68c\uc758, 2017\/02\/20<\/li>\n<li>\uc774\uc885\ud601, &#8220;Mobile Edge Computing: Overview, Use cases, Challenges&#8221;, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0, 2017\/02\/09<\/li>\n<\/ol>\n<h2><strong>2016<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;\ube14\ub85d\uccb4\uc778 \uae30\ubc18\uc758 DNS: Namecoin \ud604\ud669&#8221;, TTA PG222, 2016\/12\/13<\/li>\n<li>\uc774\uc885\ud601, &#8220;IP\uae30\ubc18 \ucc28\ub7c9\ub124\ud2b8\uc6cc\ud06c: IETF IPWAVE WG Status&#8221;, IETF \ubbf8\ub7ec\ud3ec\ub7fc, 2016\/11\/29<\/li>\n<li>Jong-Hyouk Lee, &#8220;Security and Privacy Issues in IPWAVE&#8221;, IETF 97 IPWAVE WG, 2016\/11\/16<\/li>\n<li>\uc774\uc885\ud601, &#8220;Software Clone Detection Based on Binary Analysis&#8221;, \uad6d\uc81c \uc800\uc791\uad8c \uae30\uc220 \ucf58\ud37c\ub7f0\uc2a4, 2016\/11\/02<\/li>\n<li>\uc774\uc885\ud601, &#8220;Hardware Security Modules for Vehicular Communications&#8221;, \ub514\uc9c0\ucea1, 2016\/08\/31<\/li>\n<li>\uc774\uc885\ud601, &#8220;Geonetworking&#8221;, TTA PG222, 2016\/08\/17<\/li>\n<li>\uc774\uc885\ud601, &#8220;Blockchain and Copyright Protection&#8221;, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0, 2016\/06\/18<\/li>\n<li>\uc774\uc885\ud601, &#8220;\uc0ac\uc774\ubc84 \uc704\ud611 \ub3d9\ud5a5 \ubd84\uc11d: \uba40\uc6e8\uc5b4\uc5d0\uc11c \ud38c\uc6e8\uc5b4 \ub8e8\ud2b8\ud0b7&#8221;, \ud2b9\ud5c8\uccad, 2016\/05\/12<\/li>\n<li>\uc774\uc885\ud601, &#8220;Blockchain and Its Application Trend&#8221;, \ud55c\uad6d\uc804\uc790\ud1b5\uc2e0\uc5f0\uad6c\uc6d0, 2016\/04\/27<\/li>\n<li>\uc774\uc885\ud601, &#8220;Mobile Network Prefix Discovery: Standardization Effort at the IETF&#8221;, TTA PG222, 2016\/04\/20<\/li>\n<li>\uc774\uc885\ud601, &#8220;Distributed Mobility Management&#8221;, \uc21c\ucc9c\ud5a5\ub300\ud559\uad50, 2016\/01\/15<\/li>\n<\/ol>\n<h2><strong>2015<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;Vehicular Communication Security Basic&#8221;, \uc21c\ucc9c\ud5a5\ub300\ud559\uad50 \uae00\ub85c\ubc8c\ud2b9\uac15, 2015\/10\/05<\/li>\n<li>Jong-Hyouk Lee, &#8220;Open Source Healthcare Sensor Platform: Prototype development with a proactive load control algorithm for biometric data&#8221;, Int. Symposium on Healthcare Information Management, 2015\/04\/17<\/li>\n<li>\uc774\uc885\ud601, &#8220;Distributed Mobility Management: Standardization Point of View&#8221;, \uc131\uade0\uad00\ub300\ud559\uad50 \uc778\ud130\ub137\ubcf4\uc548\uc5f0\uad6c\uc2e4, 2015\/04\/01<\/li>\n<\/ol>\n<h2><strong>2014<\/strong><\/h2>\n<ol>\n<li>\uc774\uc885\ud601, &#8220;\uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c\uacfc \ud488\uc9c8: \ud488\uc9c8 \ud3c9\uac00 \ubaa8\ub378\uacfc \uc778\uc99d&#8221;, \ucda9\ub0a8\ud14c\ud06c\ub178\ud30c\ud06c, 2014\/12\/22<\/li>\n<li>\uc774\uc885\ud601, &#8220;Introduction of the IETF Geonet: Standardization Efforts at the IETF&#8221;, TTA SPG12, 2014\/10\/08<\/li>\n<li>\uc774\uc885\ud601, &#8220;\ubd84\uc0b0\ub41c \uc774\ub3d9\uc131 \uad00\ub9ac \uae30\uc220: \ud45c\uc900\ud654 \uc9c4\ud589\uc0ac\ud56d&#8221;, IETF \ubbf8\ub7ec\ud3ec\ub7fc, 2014\/05\/29<\/li>\n<li>Sangheon Pack and Jong-Hyouk Lee, &#8220;Towards Information Centric Vehicular Networks&#8221;, IEEE VTC 2014 Spring Tutorial, 2014\/05\/18<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>2025 \uc774\uc885\ud601, &#8220;Beyond Reaction: Proactive Cyber Threat Intelligence with Graph Neural Networks and MITRE ATT&amp;CK&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc81c17\ud68c CPS \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2025\/10\/16 2024 \uc774\uc885\ud601, &#8220;Optimal Frequency Range Exploration for Acoustic Signal Air-Gap Attacks&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc81c15\ud68c CPS \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2024\/10\/10 \uc774\uc885\ud601, &#8220;ARP Spoofing Attack on the E2 Interface in Open RAN&#8221;, \ud55c\uad6d\uc815\ubcf4\ubcf4\ud638\ud559\ud68c \uc81c14\ud68c CPS \ubcf4\uc548 \uc6cc\ud06c\uc20d, 2024\/05\/30 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/1183"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1183"}],"version-history":[{"count":21,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/1183\/revisions"}],"predecessor-version":[{"id":4173,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/1183\/revisions\/4173"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}