{"id":135515,"date":"2022-12-06T19:39:02","date_gmt":"2022-12-06T10:39:02","guid":{"rendered":"http:\/\/ee.presscat.kr\/?post_type=best_course&#038;p=135515"},"modified":"2026-04-04T14:53:20","modified_gmt":"2026-04-04T05:53:20","slug":"prof-yongdae-kim","status":"publish","type":"best_course","link":"http:\/\/ee.presscat.kr\/en\/best_course\/prof-yongdae-kim\/","title":{"rendered":"Prof. Kim, Yongdae"},"content":{"rendered":"<p>Prof. Yongdae Kim<\/p>\n<p><span style=\"color: #000000\">EE515 Theory of Hacking<\/span><\/p>\n<p>(2021 Autumn Semester)<\/p>\n","protected":false},"featured_media":135511,"template":"","list_year":[176],"best_division":[193],"best_course_paper":[197],"class_list":["post-135515","best_course","type-best_course","status-publish","has-post-thumbnail","hentry","list_year-176","best_division-computer-en","best_course_paper-grand-en"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_course\/135515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_course"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/best_course"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media\/135511"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=135515"}],"wp:term":[{"taxonomy":"list_year","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/list_year?post=135515"},{"taxonomy":"best_division","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_division?post=135515"},{"taxonomy":"best_course_paper","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_course_paper?post=135515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}