{"version":"1.0","provider_name":"Institute for Security Science &amp; Technology","provider_url":"https:\/\/blogs.imperial.ac.uk\/security-institute","author_name":"Duncan Swinscow-Hall","author_url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/author\/dswinsco\/","title":"Can we trust cyber-physical systems? - Institute for Security Science &amp; Technology","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"uJRgLJkycR\"><a href=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/12\/20\/can-we-trust-cyber-physical-systems\/\">Can we trust cyber-physical systems?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blogs.imperial.ac.uk\/security-institute\/2017\/12\/20\/can-we-trust-cyber-physical-systems\/embed\/#?secret=uJRgLJkycR\" width=\"600\" height=\"338\" title=\"&#8220;Can we trust cyber-physical systems?&#8221; &#8212; Institute for Security Science &amp; Technology\" data-secret=\"uJRgLJkycR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blogs.imperial.ac.uk\/security-institute\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"A post by Professor Emil Lupu, Associate Director of the ISST and Director of the Academic Centre of Excellence in Cyber Security\u00a0Research. It\u2019s often reported that we can expect 30 billion IoT devices in the world by 2020, creating webs of cyber-physical systems that combine the digital, physical and human dimensions. In the not too [&hellip;]","thumbnail_url":"https:\/\/blogs.imperial.ac.uk\/security-institute\/files\/2017\/12\/Emil_1-238x300.png"}