{"version":"1.0","provider_name":"Cyberagentur","provider_url":"https:\/\/www.cyberagentur.de\/en\/","author_name":"ML","author_url":"https:\/\/www.cyberagentur.de\/en\/author\/ml\/","title":"Forensics of Intelligent Systems (FIS) - Cyberagentur","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Ly4qmD87xf\"><a href=\"https:\/\/www.cyberagentur.de\/en\/programs\/fis\/\">Forensics of Intelligent Systems (FIS)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberagentur.de\/en\/programs\/fis\/embed\/#?secret=Ly4qmD87xf\" width=\"600\" height=\"338\" title=\"&#8220;Forensics of Intelligent Systems (FIS)&#8221; &#8212; Cyberagentur\" data-secret=\"Ly4qmD87xf\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberagentur.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/FIS_2.jpg","thumbnail_width":2304,"thumbnail_height":1792,"description":"Background IT forensics describes the securing and analysis of criminally relevant data from IT systems using scientific methods. Strictly methodical data analysis is used to prove facts in court. Digital forensics also plays a decisive role in the application context of artificial intelligence, both for AI systems in private use and for frequently networked AI [&hellip;]"}