{"version":"1.0","provider_name":"Cyberagentur","provider_url":"https:\/\/www.cyberagentur.de\/en\/","author_name":"ML","author_url":"https:\/\/www.cyberagentur.de\/en\/author\/ml\/","title":"Holistic Evaluation of Generative Foundation Models in a Security Context (HEGEMON) - Cyberagentur","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"FlYOxfHMME\"><a href=\"https:\/\/www.cyberagentur.de\/en\/programs\/hegemon\/\">Holistic Evaluation of Generative Foundation Models in a Security Context (HEGEMON)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cyberagentur.de\/en\/programs\/hegemon\/embed\/#?secret=FlYOxfHMME\" width=\"600\" height=\"338\" title=\"&#8220;Holistic Evaluation of Generative Foundation Models in a Security Context (HEGEMON)&#8221; &#8212; Cyberagentur\" data-secret=\"FlYOxfHMME\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cyberagentur.de\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/HEGEMON.jpg","thumbnail_width":2304,"thumbnail_height":1792,"description":"Background Generative AI applications such as ChatGPT or Midjourney are currently attracting a great deal of attention. These models can be used in a wide range of application areas without any prior technical knowledge due to their ability to generate complex and multimodal outputs (e.g. text, image, audio, video) based on free inputs (prompts). The [&hellip;]"}