{"id":3085,"date":"2025-09-09T14:46:27","date_gmt":"2025-09-09T18:46:27","guid":{"rendered":"https:\/\/www.yorku.ca\/research\/bccc\/?p=3085"},"modified":"2025-09-09T14:47:05","modified_gmt":"2025-09-09T18:47:05","slug":"new-article-alert-12","status":"publish","type":"post","link":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/","title":{"rendered":"New Article Alert!"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.3%\">\n<figure class=\"wp-block-image size-full img-thumbnail rounded-0\"><img loading=\"lazy\" decoding=\"async\" width=\"1856\" height=\"556\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png\" alt=\"\" class=\"wp-image-3086\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png 1856w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled-400x120.png 400w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled-1024x307.png 1024w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled-1536x460.png 1536w\" sizes=\"auto, (max-width: 1856px) 100vw, 1856px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.6%\">\n<h2 class=\"wp-block-heading\"><strong><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3764580\">Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology<\/a><\/strong><\/h2>\n\n\n\n<p>Malware has sharply escalated, with a 30% surge in global cyberattacks in 2024, highlighting the limitations of traditional detection methods against sophisticated threats. This survey addresses gaps in prior work by applying the OSCAR methodology to review memory acquisition techniques, forensic methods, and malware detection approaches, providing the most diverse taxonomy to date. It also evaluates memory dump datasets and categorizes detection methods, including both traditional and machine learning approaches, highlighting their accuracy, benefits, drawbacks, and challenges.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology Malware has sharply escalated, with a 30% surge in global cyberattacks in 2024, highlighting the limitations of traditional detection methods against sophisticated threats. This survey addresses gaps in prior work by applying the OSCAR methodology to review memory acquisition techniques, forensic methods, and [&hellip;]<\/p>\n","protected":false},"author":1159,"featured_media":3086,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[4],"tags":[8,12,32,22,23,13,16],"class_list":["post-3085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-news","tag-behaviour-centric-cybersecurity-center-bccc","tag-everyone","tag-new-article","tag-news","tag-post","tag-public","tag-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New Article Alert! - Behaviour-Centric Cybersecurity Center (BCCC)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Article Alert! - Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"og:description\" content=\"Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology Malware has sharply escalated, with a 30% surge in global cyberattacks in 2024, highlighting the limitations of traditional detection methods against sophisticated threats. This survey addresses gaps in prior work by applying the OSCAR methodology to review memory acquisition techniques, forensic methods, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/\" \/>\n<meta property=\"og:site_name\" content=\"Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-09T18:46:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T18:47:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1856\" \/>\n\t<meta property=\"og:image:height\" content=\"556\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ahabibil\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ahabibil\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/\"},\"author\":{\"name\":\"ahabibil\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#\\\/schema\\\/person\\\/ce1189d71b333a3c50882fcaea76923d\"},\"headline\":\"New Article Alert!\",\"datePublished\":\"2025-09-09T18:46:27+00:00\",\"dateModified\":\"2025-09-09T18:47:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/\"},\"wordCount\":90,\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2025\\\/09\\\/Untitled.png\",\"keywords\":[\"Behaviour-Centric Cybersecurity Center (BCCC)\",\"Everyone\",\"New Article\",\"News\",\"Post\",\"Public\",\"Research\"],\"articleSection\":[\"Latest News\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/\",\"name\":\"New Article Alert! - Behaviour-Centric Cybersecurity Center (BCCC)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2025\\\/09\\\/Untitled.png\",\"datePublished\":\"2025-09-09T18:46:27+00:00\",\"dateModified\":\"2025-09-09T18:47:05+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#\\\/schema\\\/person\\\/ce1189d71b333a3c50882fcaea76923d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2025\\\/09\\\/Untitled.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2025\\\/09\\\/Untitled.png\",\"width\":1856,\"height\":556},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/2025\\\/09\\\/09\\\/new-article-alert-12\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Article Alert!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\",\"name\":\"Behaviour-Centric Cybersecurity Center (BCCC)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#\\\/schema\\\/person\\\/ce1189d71b333a3c50882fcaea76923d\",\"name\":\"ahabibil\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45adba8a60f340af0d58b3ec1ff880a181ad4a9f8521e4fcb577aac90307b614?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45adba8a60f340af0d58b3ec1ff880a181ad4a9f8521e4fcb577aac90307b614?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45adba8a60f340af0d58b3ec1ff880a181ad4a9f8521e4fcb577aac90307b614?s=96&d=mm&r=g\",\"caption\":\"ahabibil\"},\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/author\\\/ahabibil\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Article Alert! - Behaviour-Centric Cybersecurity Center (BCCC)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/","og_locale":"en_US","og_type":"article","og_title":"New Article Alert! - Behaviour-Centric Cybersecurity Center (BCCC)","og_description":"Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology Malware has sharply escalated, with a 30% surge in global cyberattacks in 2024, highlighting the limitations of traditional detection methods against sophisticated threats. This survey addresses gaps in prior work by applying the OSCAR methodology to review memory acquisition techniques, forensic methods, and [&hellip;]","og_url":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/","og_site_name":"Behaviour-Centric Cybersecurity Center (BCCC)","article_published_time":"2025-09-09T18:46:27+00:00","article_modified_time":"2025-09-09T18:47:05+00:00","og_image":[{"width":1856,"height":556,"url":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png","type":"image\/png"}],"author":"ahabibil","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ahabibil","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#article","isPartOf":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/"},"author":{"name":"ahabibil","@id":"https:\/\/www.yorku.ca\/research\/bccc\/#\/schema\/person\/ce1189d71b333a3c50882fcaea76923d"},"headline":"New Article Alert!","datePublished":"2025-09-09T18:46:27+00:00","dateModified":"2025-09-09T18:47:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/"},"wordCount":90,"image":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png","keywords":["Behaviour-Centric Cybersecurity Center (BCCC)","Everyone","New Article","News","Post","Public","Research"],"articleSection":["Latest News"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/","url":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/","name":"New Article Alert! - Behaviour-Centric Cybersecurity Center (BCCC)","isPartOf":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#primaryimage"},"image":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png","datePublished":"2025-09-09T18:46:27+00:00","dateModified":"2025-09-09T18:47:05+00:00","author":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/#\/schema\/person\/ce1189d71b333a3c50882fcaea76923d"},"breadcrumb":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#primaryimage","url":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png","contentUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled.png","width":1856,"height":556},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/research\/bccc\/2025\/09\/09\/new-article-alert-12\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/research\/bccc\/"},{"@type":"ListItem","position":2,"name":"New Article Alert!"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website","url":"https:\/\/www.yorku.ca\/research\/bccc\/","name":"Behaviour-Centric Cybersecurity Center (BCCC)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/research\/bccc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.yorku.ca\/research\/bccc\/#\/schema\/person\/ce1189d71b333a3c50882fcaea76923d","name":"ahabibil","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/45adba8a60f340af0d58b3ec1ff880a181ad4a9f8521e4fcb577aac90307b614?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45adba8a60f340af0d58b3ec1ff880a181ad4a9f8521e4fcb577aac90307b614?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45adba8a60f340af0d58b3ec1ff880a181ad4a9f8521e4fcb577aac90307b614?s=96&d=mm&r=g","caption":"ahabibil"},"url":"https:\/\/www.yorku.ca\/research\/bccc\/author\/ahabibil\/"}]}},"taxonomy_info":{"category":[{"value":4,"label":"Latest News"}],"post_tag":[{"value":8,"label":"Behaviour-Centric Cybersecurity Center (BCCC)"},{"value":12,"label":"Everyone"},{"value":32,"label":"New Article"},{"value":22,"label":"News"},{"value":23,"label":"Post"},{"value":13,"label":"Public"},{"value":16,"label":"Research"}]},"featured_image_src_large":["https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/09\/Untitled-1024x307.png",1024,307,true],"author_info":{"display_name":"ahabibil","author_link":"https:\/\/www.yorku.ca\/research\/bccc\/author\/ahabibil\/"},"comment_info":"","category_info":[{"term_id":4,"name":"Latest News","slug":"latest-news","term_group":0,"term_taxonomy_id":4,"taxonomy":"category","description":"","parent":0,"count":55,"filter":"raw","cat_ID":4,"category_count":55,"category_description":"","cat_name":"Latest News","category_nicename":"latest-news","category_parent":0}],"tag_info":[{"term_id":8,"name":"Behaviour-Centric Cybersecurity Center (BCCC)","slug":"behaviour-centric-cybersecurity-center-bccc","term_group":0,"term_taxonomy_id":8,"taxonomy":"post_tag","description":"","parent":0,"count":83,"filter":"raw"},{"term_id":12,"name":"Everyone","slug":"everyone","term_group":0,"term_taxonomy_id":12,"taxonomy":"post_tag","description":"","parent":0,"count":83,"filter":"raw"},{"term_id":32,"name":"New Article","slug":"new-article","term_group":0,"term_taxonomy_id":32,"taxonomy":"post_tag","description":"","parent":0,"count":23,"filter":"raw"},{"term_id":22,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":22,"taxonomy":"post_tag","description":"","parent":0,"count":55,"filter":"raw"},{"term_id":23,"name":"Post","slug":"post","term_group":0,"term_taxonomy_id":23,"taxonomy":"post_tag","description":"","parent":0,"count":55,"filter":"raw"},{"term_id":13,"name":"Public","slug":"public","term_group":0,"term_taxonomy_id":13,"taxonomy":"post_tag","description":"","parent":0,"count":83,"filter":"raw"},{"term_id":16,"name":"Research","slug":"research","term_group":0,"term_taxonomy_id":16,"taxonomy":"post_tag","description":"","parent":0,"count":81,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/posts\/3085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/users\/1159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/comments?post=3085"}],"version-history":[{"count":2,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/posts\/3085\/revisions"}],"predecessor-version":[{"id":3088,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/posts\/3085\/revisions\/3088"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/media\/3086"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/media?parent=3085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/categories?post=3085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/tags?post=3085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}