{"provider_name":"Ghostarchive","provider_url":"https://ghostarchive.org/","type":"video","version":"1.0","title":"28c3: Security Log Visualization with a Correlation Engine","author_url":"http://www.youtube.com/user/28c3","author_name":"28c3","aut":"https://www.youtube.com/watch?v=j4pF9VUdphc","width":"256","height":"144","html":"<iframe  width=\"256\"  height=\"144\"  src=\"https://ghostarchive.org/vembed/j4pF9VUdphc/\"  frameborder=\"0\" allowfullscreen></iframe>"}