{"id":25,"date":"2017-10-22T07:06:11","date_gmt":"2017-10-22T06:06:11","guid":{"rendered":"http:\/\/its.informatik.htw-aalen.de\/wp\/?page_id=25"},"modified":"2017-10-22T07:07:10","modified_gmt":"2017-10-22T06:07:10","slug":"frontpage","status":"publish","type":"page","link":"https:\/\/its.informatik.htw-aalen.de\/wp\/","title":{"rendered":"Frontpage"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 hundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-overflow:visible;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-3 fusion-columns-total-3 fusion-content-boxes-1 content-boxes-icon-with-title content-left\" style=\"--awb-hover-accent-color:#67b7e1;--awb-circle-hover-accent-color:#67b7e1;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa fa-user circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;\">Allgemeines<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Willkommen auf meiner Webpage. Hier finden Sie Informationen rund um Aktivit\u00e4ten im Rahmen meiner T\u00e4tigkeit als Professor an der Hochschule Aalen.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover \"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa fa-book circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;\">Lehre<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Meine Lehrgebiete sind Angewandte Kryptografie, IT-Sicherheit sowie Grundlagen der Informatik und Mathematik.<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-4 col-md-4 col-sm-4 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:#333333;border-width:1px;background-color:#333333;box-sizing:content-box;height:42px;width:42px;line-height:42px;border-radius:50%;font-size:21px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa fa-lock circle-yes\"><\/i><\/div><h2 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h2_typography-font-size:18px;--fontSize:18;line-height:1.5;\">IT-Sicherheit<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">Der im Studiengang Informatik der Hochschule Aalen angesiedelte Studienschwerpunkt IT-Sicherheit bietet eine attraktive Ausbildung.<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-text fusion-text-1\"><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-title title fusion-title-1 fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:19;--minFontSize:19;line-height:1.5;\">Neueste Beitr\u00e4ge<\/h2><span class=\"awb-title-spacer\"><\/span><div class=\"title-sep-container\"><div class=\"title-sep sep-double sep-solid\" style=\"border-color:#e0dede;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-margin-bottom:0px;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-recent-posts fusion-recent-posts-1 avada-container layout-default layout-columns-4\"><section class=\"fusion-columns columns fusion-columns-4 columns-4\"><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\" aria-label=\"Kryptographische Protokolle\" class=\"hover-type-none\"><img decoding=\"async\" width=\"660\" height=\"405\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2013\/03\/kryptografie-660x405.jpg 660w, https:&#x2f;&#x2f;&#x69;&#x74;&#x73;&#x2e;&#x69;&#x6e;&#x66;&#x6f;&#x72;&#x6d;&#x61;&#x74;&#105;&#107;&#46;&#104;&#116;&#119;&#45;&#97;&#97;&#108;&#101;n&#46;de\/wp\/&#x77;&#x70;&#x2d;&#x63;&#x6f;&#x6e;&#x74;&#x65;&#x6e;&#x74;&#x2f;&#x75;&#x70;&#x6c;&#x6f;&#97;&#100;&#115;&#47;&#50;&#48;&#49;&#51;&#47;&#48;3\/krypto&#x67;&#x72;&#x61;&#x66;&#x69;&#x65;&#x2d;&#x36;&#x36;&#x30;&#x78;&#x34;&#x30;&#x35;&#x40;&#50;&#120;&#46;&#106;&#112;&#103; 1320w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-14T09:07:29+02:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=336\">Kryptographische Protokolle<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-04-14T09:07:29+02:00<\/span><span>14. April  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Kryptographische Protokolle<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\" aria-label=\"Sichere Programmierung\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/10\/sichere-programmierung-700x441.jpg 700w, https:\/&#47;&#x69;&#x74;s&#46;&#x69;&#x6e;f&#111;&#x72;&#x6d;a&#116;&#x69;&#x6b;&#46;&#104;&#x74;&#x77;-&#97;&#97;&#x6c;&#x65;n&#46;&#x64;&#x65;\/&#119;&#x70;&#x2f;w&#112;&#x2d;&#x63;o&#110;&#x74;&#x65;n&#116;&#x2f;&#x75;p&#108;&#111;&#x61;&#x64;s&#47;&#x32;&#x30;1&#54;&#x2f;&#x31;0&#47;&#x73;&#x69;c&#104;&#x65;&#x72;e&#45;&#x70;&#x72;o&#103;&#114;&#x61;&#x6d;m&#105;&#x65;&#x72;u&#110;&#x67;&#x2d;3&#50;&#x30;&#x78;2&#48;&#x32;&#x40;2&#120;&#x2e;&#x6a;p&#103; 640w, https:\/&#47;&#x69;&#x74;&#x73;&#46;&#105;&#110;&#x66;&#x6f;r&#109;&#97;&#x74;&#x69;k&#46;&#104;&#x74;&#x77;&#x2d;a&#97;&#x6c;&#x65;&#x6e;&#46;&#100;&#101;&#x2f;&#x77;p&#47;&#119;&#x70;&#x2d;co&#110;&#x74;&#x65;&#x6e;t&#47;&#117;&#x70;&#x6c;o&#97;&#100;&#x73;&#x2f;2&#48;&#49;&#x36;&#x2f;10&#47;&#x73;&#x69;&#x63;h&#101;&#114;&#x65;&#x2d;p&#114;&#111;&#x67;&#x72;a&#109;&#109;&#x69;&#x65;ru&#110;&#x67;&#x2d;&#x37;0&#48;&#120;&#x34;&#x34;1&#64;&#50;&#x78;&#x2e;jp&#103; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-23T16:42:26+01:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1336\">Sichere Programmierung<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-23T16:42:26+01:00<\/span><span>23. March  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sichere Programmierung<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\" aria-label=\"Sicherheit von Webanwendungen\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2018\/10\/sichere-webanwendungen-700x441.jpg 700w, https:\/&#47;&#x69;&#x74;&#x73;&#46;&#105;&#x6e;&#x66;&#x6f;r&#109;&#x61;&#x74;&#x69;k&#46;&#x68;&#x74;&#x77;-&#97;&#x61;&#x6c;&#x65;n&#46;&#x64;&#x65;&#x2f;w&#112;&#x2f;&#x77;&#x70;-&#99;&#x6f;&#x6e;&#x74;e&#110;&#x74;&#x2f;&#x75;p&#108;&#x6f;&#x61;&#x64;s&#47;&#x32;&#x30;&#x31;8&#47;&#x31;&#x30;&#x2f;s&#105;&#x63;&#x68;&#x65;r&#101;&#x2d;&#x77;&#x65;b&#97;&#x6e;&#x77;&#x65;n&#100;&#x75;&#x6e;&#x67;e&#110;&#x2d;&#x33;&#x32;0&#120;&#x32;&#x30;&#x32;&#64;&#50;&#x78;&#x2e;&#x6a;p&#103; 640w, https:&#x2f;&#x2f;&#x69;&#116;&#115;&#46;i&#x6e;&#x66;&#x6f;&#x72;&#109;&#97;ti&#x6b;&#x2e;&#x68;&#116;&#119;&#45;aa&#x6c;&#x65;&#x6e;&#46;&#100;e\/&#x77;&#x70;&#x2f;&#x77;&#112;&#45;co&#x6e;&#x74;&#x65;&#110;&#116;&#47;up&#x6c;&#x6f;&#x61;&#100;&#115;\/2&#x30;&#x31;&#x38;&#x2f;&#49;&#48;\/s&#x69;&#x63;&#x68;&#101;&#114;&#101;-w&#x65;&#x62;&#x61;&#110;&#119;&#101;n&#x64;&#x75;&#x6e;&#x67;&#101;&#110;-7&#x30;&#x30;&#x78;&#x34;&#52;&#49;&#64;2&#x78;&#x2e;&#x6a;&#112;&#103; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-23T16:40:08+01:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1833\">Sicherheit von Webanwendungen<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-23T16:40:08+01:00<\/span><span>23. March  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Sicherheit von Webanwendungen<\/span><\/span><\/span><\/p><\/div><\/article><article class=\"post fusion-column column col col-lg-3 col-md-3 col-sm-3\"><div class=\"fusion-flexslider fusion-flexslider-loading flexslider flexslider-hover-type-none\"><ul class=\"slides\"><li><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\" aria-label=\"Wahrscheinlichkeitstheorie und Statistik\" class=\"hover-type-none\"><img decoding=\"async\" width=\"700\" height=\"441\" src=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg\" class=\"attachment-recent-posts size-recent-posts\" alt=\"\" srcset=\"https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-320x202.jpg 320w, https:\/\/its.informatik.htw-aalen.de\/wp\/wp-content\/uploads\/2016\/04\/wahrscheinlichkeit-700x441.jpg 700w, https:&#47;&#47;&#x69;&#x74;&#115;&#46;&#x69;&#x6e;&#102;&#111;&#x72;&#x6d;&#97;&#116;&#x69;&#x6b;&#46;&#104;&#x74;&#x77;&#45;&#97;&#x61;&#x6c;&#101;&#110;&#x2e;&#x64;&#101;&#47;&#x77;&#x70;&#47;&#119;&#x70;&#x2d;&#99;&#111;&#x6e;&#x74;&#101;&#110;&#x74;&#x2f;&#117;&#112;&#x6c;&#x6f;&#97;&#100;&#x73;&#x2f;&#50;&#48;&#x31;&#x36;&#47;&#48;&#x34;&#x2f;&#119;&#97;&#x68;&#x72;&#115;&#99;&#x68;&#x65;&#105;&#110;&#x6c;&#x69;&#99;&#104;&#x6b;&#x65;&#105;&#116;&#x2d;&#x33;&#50;&#48;&#x78;&#x32;&#48;&#50;&#x40;&#x32;&#120;&#46;&#x6a;&#x70;&#103; 640w, https:&#x2f;&#x2f;&#x69;&#x74;&#115;&#46;inf&#x6f;&#x72;&#x6d;&#x61;&#116;&#105;k&#46;h&#x74;&#x77;&#x2d;&#x61;&#97;&#108;&#101;n&#46;&#x64;&#x65;&#x2f;&#x77;&#112;&#47;&#119;p-&#x63;&#x6f;&#x6e;&#x74;&#101;&#110;&#116;\/u&#x70;&#x6c;&#x6f;&#x61;&#100;&#115;&#47;20&#x31;&#x36;&#x2f;&#x30;&#52;&#47;&#119;ah&#x72;&#x73;&#x63;&#x68;&#101;&#105;&#110;li&#x63;&#x68;&#x6b;&#x65;&#105;&#116;&#45;70&#x30;&#x78;&#x34;&#x34;&#49;&#64;&#50;x&#46;&#x6a;&#x70;&#x67; 1400w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/a><\/li><\/ul><\/div><div class=\"recent-posts-content\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-23T16:36:06+01:00<\/span><h4 class=\"entry-title\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?p=1240\">Wahrscheinlichkeitstheorie und Statistik<\/a><\/h4><p class=\"meta\"><span class=\"vcard\" style=\"display: none;\"><span class=\"fn\"><a href=\"https:\/\/its.informatik.htw-aalen.de\/wp\/?author=2\" title=\"Posts by Christoph Karg\" rel=\"author\">Christoph Karg<\/a><\/span><\/span><span class=\"updated\" style=\"display:none;\">2026-03-23T16:36:06+01:00<\/span><span>23. March  2026<\/span><span class=\"fusion-inline-sep\">|<\/span><span class=\"fusion-comments\"><span>Comments Off<span class=\"screen-reader-text\"> on Wahrscheinlichkeitstheorie und Statistik<\/span><\/span><\/span><\/p><\/div><\/article><\/section><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25"}],"version-history":[{"count":75,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":1610,"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=\/wp\/v2\/pages\/25\/revisions\/1610"}],"wp:attachment":[{"href":"https:\/\/its.informatik.htw-aalen.de\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}