{"id":33,"date":"2011-07-28T03:26:32","date_gmt":"2011-07-28T03:26:32","guid":{"rendered":"http:\/\/people.utm.my\/nazri\/?page_id=33"},"modified":"2020-03-23T17:13:57","modified_gmt":"2020-03-23T09:13:57","slug":"research","status":"publish","type":"page","link":"https:\/\/people.utm.my\/nazri\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.3.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<h3 style=\"text-align: justify\">Research<\/h3>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify\"><strong>Research Interests:<\/strong><\/p>\n<ol>\n<li>Software Engineering Process<\/li>\n<li>Software Measurement<\/li>\n<li>Software Quality Assurance<\/li>\n<li>Empirical Software Engineering<\/li>\n<li>Big Data Analytics<\/li>\n<li>Bridging Information Security and Software Engineering<\/li>\n<\/ol>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research &nbsp; Research Interests: Software Engineering Process Software Measurement Software Quality Assurance Empirical Software Engineering Big Data Analytics Bridging Information Security and Software Engineering<\/p>\n","protected":false},"author":6470,"featured_media":0,"parent":0,"menu_order":10,"comment_status":"closed","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p style=\"text-align: justify;\"><strong>Research Interests:<\/strong><\/p><ol style=\"text-align: justify;\"><li>Software Engineering Process<\/li><li>Software Measurement<\/li><li>Software Quality Assurance<\/li><li>Empirical Software Engineering<\/li><li>Bridging Information Security and Software Engineering<\/li><\/ol>","_et_gb_content_width":"","footnotes":""},"class_list":["post-33","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/pages\/33","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/users\/6470"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":1,"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":1690,"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/pages\/33\/revisions\/1690"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/nazri\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}