{"id":2090,"date":"2025-03-17T16:08:55","date_gmt":"2025-03-17T15:08:55","guid":{"rendered":"https:\/\/cyber-detect.com\/les-innovations\/"},"modified":"2025-03-25T11:33:44","modified_gmt":"2025-03-25T10:33:44","slug":"innovations","status":"publish","type":"page","link":"https:\/\/cyber-detect.com\/en\/innovations\/","title":{"rendered":"INNOVATIONS"},"content":{"rendered":"<div class=\"container fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">EN QUOI SOMMES NOUS INNOVANTS<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"list-icons block-list-icons\" id=\"list-icons-block_085acb5dec35cb9cae4b17d0599ae799\">\n\n    \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/a_picto1.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Caract\u00e9risation et attribution de la menace<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/a_picto2.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">D\u00e9tection de nouvelle g\u00e9n\u00e9ration avant d\u00e9tonation<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/a_picto3.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Temps de d\u00e9tection sous la seconde<\/p>\n                    <\/div>\n\n                            \n        \n                            \n                    <div class=\"wrap-list\">\n                        <img decoding=\"async\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/a_picto4.png\" alt=\"Ic\u00f4ne\" \/>\n\n                        <p class=\"description-list\">Int\u00e9gration aux solution en places via API<\/p>\n                    <\/div>\n\n                            \n        \n<\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Les avantages de notre technologie<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container fullwidth fullwidth\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list has-white-color has-text-color has-link-color wp-elements-9045cd8e9af256f4ff3621c20483265a\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><strong>Nommage<\/strong> et <strong>attribution<\/strong> de la famille de malware<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>R\u00e9sistant aux <strong>protections<\/strong><\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>R\u00e9sistant aux <strong>variants : <\/strong>analyse morphologique non-bas\u00e9e sur les signatures<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><strong>Explicabilit\u00e9<\/strong> des r\u00e9sultats<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-style-dark-background-color-1 is-layout-flow wp-block-column-is-layout-flow\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<ul class=\"wp-block-list has-white-color has-text-color has-link-color wp-elements-3a1b17a25f0d218dbd620a0de0967da0\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><strong>% de corr\u00e9lation <\/strong>avec les menaces existantes<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li><strong>Compatible<\/strong> avec les syst\u00e8mes de d\u00e9fense du march\u00e9<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>Repr\u00e9sentation <strong>3D<\/strong> de la menace<\/li>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<li>Pionniers de l\u2019analyse dynamique depuis la cr\u00e9ation<\/li>\n<\/div><\/div><\/div><\/ul>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-media-text is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"812\" height=\"1024\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png\" alt=\"\" class=\"wp-image-1881 size-full\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png 812w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-238x300.png 238w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-768x968.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2.png 1000w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><\/figure><div class=\"wp-block-media-text__content\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-left\">L&#8217;analyse morphologique au c\u0153ur de la s\u00e9curit\u00e9 informatique des entreprises<\/h2>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Les moteurs classiques de d\u00e9tection des logiciels malveillants utilisent le plus souvent des techniques \u00e0 base de reconnaissance de signatures comme les r\u00e8gles YARA.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Ce n\u2019est aujourd\u2019hui plus suffisant car les malwares sont d\u00e9sormais capables de s\u2019auto-modifier rapidement et facilement, cassant ainsi les signatures utilis\u00e9es pour les d\u00e9tecter.\u00a0<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Pour rem\u00e9dier \u00e0 cette faille de cyber-s\u00e9curit\u00e9, nous avons \u00e9labor\u00e9 une technique unique : l\u2019<strong>analyse morphologique<\/strong>.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p class=\"has-text-align-left\">Notre solution analyse <strong>statiquement et dynamiquement le code binaire<\/strong> des applications pour <strong>garantir la s\u00e9curit\u00e9 informatique des entreprises<\/strong>.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top\" style=\"grid-template-columns:auto 30%\"><div class=\"wp-block-media-text__content\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h3 class=\"wp-block-heading\">Le fonctionnement de l&#8217;analyse morphologique<\/h3>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>L&#8217;analyse morphologique qualifie les comportements malveillants d\u00e9tect\u00e9s. Cette facult\u00e9 am\u00e9liore la s\u00e9curit\u00e9 informatique des entreprises en rep\u00e9rant des attaques toujours plus sophistiqu\u00e9es, inconnues ou encore obfusqu\u00e9es.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>L&#8217;analyse morphologique conjugue l&#8217;intelligence artificielle qui assimile les nouvelles menaces et fonctions, \u00e0 des techniques de reverse-engineering essentielles au d\u00e9sassemblage et \u00e0 la d\u00e9-obfuscation.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>Cette innovation, \u00e9galement coupl\u00e9e aux outils des m\u00e9thodes formelles, offre une pr\u00e9cision singuli\u00e8re et in\u00e9gal\u00e9e sur les ex\u00e9cutables sans pour autant n\u00e9cessiter de phase d\u2019apprentissage.<\/p>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h3 class=\"wp-block-heading\">Comment d\u00e9tecter de nouveaux variants ?<\/h3>\n<\/div><\/div><\/div>\n\n<div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<p>L\u2019analyse morphologique d\u00e9sassemble et analyse le code binaire \u00e0 travers un graphe de flot de contr\u00f4le. En effectuant une analyse dynamique, nous sommes ainsi capables d\u2019appliquer des transformations, r\u00e9ductions et d\u00e9coupage du binaire afin de statuer sur sa nature. Nous pouvons ainsi estimer le pourcentage de ressemblance avec un malware d\u00e9j\u00e0 d\u00e9tect\u00e9 et d\u00e9celer ses variants.<\/p>\n<\/div><\/div><\/div><\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"765\" height=\"1024\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo1-765x1024.png\" alt=\"\" class=\"wp-image-1885 size-full\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo1-765x1024.png 765w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo1-224x300.png 224w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo1-768x1028.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo1.png 800w\" sizes=\"auto, (max-width: 765px) 100vw, 765px\" \/><\/figure><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<h2 class=\"wp-block-heading has-text-align-center\">Notre gestion des fichiers pack\u00e9s<\/h2>\n<\/div><\/div><\/div><div class=\"wp-block-image\"><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"188\" src=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-14-copie-1024x188.png\" alt=\"\" class=\"wp-image-1759\" srcset=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-14-copie-1024x188.png 1024w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-14-copie-300x55.png 300w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-14-copie-768x141.png 768w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-14-copie-1536x282.png 1536w, https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/CYD-Tous-14-copie.png 1844w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div><\/div><\/div><div class=\"container\"><div class=\"row\"><div class=\"medium-large-full\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>EN QUOI SOMMES NOUS INNOVANTS Les avantages de notre technologie L&#8217;analyse morphologique au c\u0153ur de la s\u00e9curit\u00e9 informatique des entreprises Les moteurs classiques de d\u00e9tection des logiciels malveillants utilisent le plus souvent des techniques \u00e0 base de reconnaissance de signatures comme les r\u00e8gles YARA. Ce n\u2019est aujourd\u2019hui plus suffisant car les malwares sont d\u00e9sormais capables [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2090","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>INNOVATIONS - Cyber-Detect<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-detect.com\/en\/innovations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"INNOVATIONS - Cyber-Detect\" \/>\n<meta property=\"og:description\" content=\"EN QUOI SOMMES NOUS INNOVANTS Les avantages de notre technologie L&#8217;analyse morphologique au c\u0153ur de la s\u00e9curit\u00e9 informatique des entreprises Les moteurs classiques de d\u00e9tection des logiciels malveillants utilisent le plus souvent des techniques \u00e0 base de reconnaissance de signatures comme les r\u00e8gles YARA. Ce n\u2019est aujourd\u2019hui plus suffisant car les malwares sont d\u00e9sormais capables [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-detect.com\/en\/innovations\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber-Detect\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T10:33:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyber-detect.com\/en\/innovations\/\",\"url\":\"https:\/\/cyber-detect.com\/en\/innovations\/\",\"name\":\"INNOVATIONS - Cyber-Detect\",\"isPartOf\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/innovations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/innovations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png\",\"datePublished\":\"2025-03-17T15:08:55+00:00\",\"dateModified\":\"2025-03-25T10:33:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/innovations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyber-detect.com\/en\/innovations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/innovations\/#primaryimage\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyber-detect.com\/en\/innovations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyber-detect.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"INNOVATIONS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#website\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"name\":\"Cyber-Detect\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyber-detect.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#organization\",\"name\":\"Cyber-Detect\",\"url\":\"https:\/\/cyber-detect.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"contentUrl\":\"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg\",\"width\":728,\"height\":242,\"caption\":\"Cyber-Detect\"},\"image\":{\"@id\":\"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"INNOVATIONS - Cyber-Detect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-detect.com\/en\/innovations\/","og_locale":"en_US","og_type":"article","og_title":"INNOVATIONS - Cyber-Detect","og_description":"EN QUOI SOMMES NOUS INNOVANTS Les avantages de notre technologie L&#8217;analyse morphologique au c\u0153ur de la s\u00e9curit\u00e9 informatique des entreprises Les moteurs classiques de d\u00e9tection des logiciels malveillants utilisent le plus souvent des techniques \u00e0 base de reconnaissance de signatures comme les r\u00e8gles YARA. Ce n\u2019est aujourd\u2019hui plus suffisant car les malwares sont d\u00e9sormais capables [&hellip;]","og_url":"https:\/\/cyber-detect.com\/en\/innovations\/","og_site_name":"Cyber-Detect","article_modified_time":"2025-03-25T10:33:44+00:00","og_image":[{"url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-detect.com\/en\/innovations\/","url":"https:\/\/cyber-detect.com\/en\/innovations\/","name":"INNOVATIONS - Cyber-Detect","isPartOf":{"@id":"https:\/\/cyber-detect.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyber-detect.com\/en\/innovations\/#primaryimage"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/innovations\/#primaryimage"},"thumbnailUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png","datePublished":"2025-03-17T15:08:55+00:00","dateModified":"2025-03-25T10:33:44+00:00","breadcrumb":{"@id":"https:\/\/cyber-detect.com\/en\/innovations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-detect.com\/en\/innovations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/innovations\/#primaryimage","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2025\/03\/photo2-812x1024.png"},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-detect.com\/en\/innovations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyber-detect.com\/en\/"},{"@type":"ListItem","position":2,"name":"INNOVATIONS"}]},{"@type":"WebSite","@id":"https:\/\/cyber-detect.com\/en\/#website","url":"https:\/\/cyber-detect.com\/en\/","name":"Cyber-Detect","description":"","publisher":{"@id":"https:\/\/cyber-detect.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyber-detect.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyber-detect.com\/en\/#organization","name":"Cyber-Detect","url":"https:\/\/cyber-detect.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","contentUrl":"https:\/\/cyber-detect.com\/wp-content\/uploads\/2021\/08\/AI-CYBER-DETECT-MORPHOLOGICAL-ANALYSIS-PAYSAGE-RGB-white-vecto.svg","width":728,"height":242,"caption":"Cyber-Detect"},"image":{"@id":"https:\/\/cyber-detect.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/2090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/comments?post=2090"}],"version-history":[{"count":4,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/2090\/revisions"}],"predecessor-version":[{"id":2095,"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/pages\/2090\/revisions\/2095"}],"wp:attachment":[{"href":"https:\/\/cyber-detect.com\/en\/wp-json\/wp\/v2\/media?parent=2090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}