<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>CyberSEA</provider_name><provider_url>https://carleton.ca/cybersea</provider_url><author_name>cuthemeedtr5</author_name><author_url>https://carleton.ca/cybersea/author/cuthemeedtr5/</author_url><title>Formal Approaches for Automated Security Evaluation - CyberSEA</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="zCRszsujMc"&gt;&lt;a href="https://carleton.ca/cybersea/video/formal-approaches-for-automated-security-evaluation/"&gt;Formal Approaches for Automated Security Evaluation&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://carleton.ca/cybersea/video/formal-approaches-for-automated-security-evaluation/embed/#?secret=zCRszsujMc" width="600" height="338" title="&#x201C;Formal Approaches for Automated Security Evaluation&#x201D; &#x2014; CyberSEA" data-secret="zCRszsujMc" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://carleton.ca/cybersea/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://carleton.ca/cybersea/wp-content/uploads/sites/191/formal-approaches-for-automated.jpg</thumbnail_url><thumbnail_width>1280</thumbnail_width><thumbnail_height>720</thumbnail_height><description>Dr. Jason Jaskolka of the CyberSEA Research Lab presents at the 2017 Smart Cybersecurity Network (SERENE-RISC) Workshop. Presentation Abstract Many of today&#x2019;s most critical systems such as those found in the transportation, financial, medical, communications, and national defence domains are becoming more complex and interconnected. Because of this, there is an increasingly critical need for [&hellip;]</description></oembed>
