This HTML5 document contains 286 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n14http://dbpedia.org/resource/Flame_(malware)
n24http://dbpedia.org/resource/Evasion_(network_security)
n26http://dbpedia.org/resource/2011_Open_Diputación_Ciudad_de_Pozoblanco_–_Men'
yago-reshttp://yago-knowledge.org/resource/
foafhttp://xmlns.com/foaf/0.1/
n13http://dbpedia.org/resource/Vulnerability_(computing)
n12http://dbpedia.org/resource/English-language_vowel_changes_before_historic_/l/
n5http://dbpedia.org/resource/Zombie_(computer_science)
yagohttp://dbpedia.org/class/yago/
n10http://dbpedia.org/resource/Payload_(computing)
n9http://dbpedia.org/resource/Trojan_horse_(computing)
rdfshttp://www.w3.org/2000/01/rdf-schema#
n8http://dbpedia.org/class/yago/Feat100036762#
n29http://dbpedia.org/resource/Fork_(file_system)
n17http://dbpedia.org/resource/Kismet_(software)
n28http://dbpedia.org/resource/Patched_(malware)
n16http://dbpedia.org/resource/Exploit_(computer_security)
n32http://dbpedia.org/resource/Zeus_(malware)
n21http://dbpedia.org/resource/Zero-day_(computing)
n18http://dbpedia.org/resource/Shoulder_surfing_(computer_security)
n19http://dbpedia.org/resource/Evil_twin_(wireless_networks)
n33http://dbpedia.org/resource/English-language_vowel_changes_before_historic_/r/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n30http://dbpedia.org/resource/Astalavista.box.
owlhttp://www.w3.org/2002/07/owl#
n31http://dbpedia.org/resource/Davies'
n15http://dbpedia.org/resource/Fakesysdef_(malware)
n11http://dbpedia.org/resource/Threat_(computer)
xsdhhttp://www.w3.org/2001/XMLSchema#
n6http://dbpedia.org/resource/BREACH_(security_exploit)
n25http://dbpedia.org/resource/2011_Open_Diputación_Ciudad_de_Pozoblanco_–_Women'
n27http://dbpedia.org/resource/Backdoor_(computing)
dbrhttp://dbpedia.org/resource/
n23http://dbpedia.org/resource/Armitage_(computing)
Subject Item
yago:Feat100036762
owl:equivalentClass
yago-res:wordnet_feat_100036762
owl:sameAs
yago:Feat100036762
rdfs:subClassOf
yago:Accomplishment100035189
foaf:topic
dbr:2013_Open_Castilla_y_León_–_Doubles dbr:2010_Moorilla_Hobart_International_–_Doubles dbr:Riskware dbr:Warzapping dbr:Arbitrary_code_execution dbr:2012_Moorilla_Hobart_International_–_Doubles dbr:ZMW_attack dbr:Spoofed_URL dbr:Pharming dbr:2012_Caloundra_International_–_Doubles dbr:Frame_injection dbr:Fast_flux dbr:Register_spring dbr:Improper_input_validation dbr:2010_Copa_Sevilla_–_Doubles n5: dbr:2011_Moorilla_Hobart_International_–_Doubles dbr:File_inclusion_vulnerability dbr:FTP_bounce_attack dbr:Dolev–Yao_model dbr:The_Open_Organisation_Of_Lockpickers dbr:Login_spoofing dbr:1984_WCT_World_Doubles dbr:Th-fronting dbr:1986_WCT_World_Doubles dbr:Slow_loris dbr:Th-stopping dbr:Cross-site_cooking dbr:Phishing dbr:Symlink_race dbr:Copy_attack dbr:Fault_injection dbr:Social_jacking dbr:1982_WCT_World_Doubles dbr:Cross-site_tracing dbr:2009_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles dbr:Cross-site_request_forgery dbr:Cross-site_scripting dbr:Mixed_threat_attack dbr:Keystroke_logging dbr:Bluejacking dbr:Form_grabbing n6: dbr:2009_Open_Castilla_y_León_–_Doubles dbr:2008_World_Mixed_Doubles_Curling_Championship dbr:AirSnort dbr:Clickjacking dbr:Pre-play_attack dbr:Race_condition dbr:Rogue_DHCP dbr:System_Reconfiguration_Attacks dbr:Pronunciation_of_English_⟨th⟩ dbr:IDN_homograph_attack dbr:Smurf_attack dbr:Clear_channel_assessment_attack dbr:Stuxnet dbr:Time_of_check_to_time_of_use n8:this dbr:TCP_sequence_prediction_attack dbr:Covert_channel n9: dbr:Relay_attack yago:WikicatWebSecurityExploits dbr:GetAdmin dbr:SQL_injection yago:WikicatInjectionExploits dbr:Browser_hijacking dbr:Advance-fee_scam yago:WikicatPrivilegeEscalationExploits dbr:Uncontrolled_format_string dbr:Defensive_computing dbr:Proof_of_concept dbr:Gh0st_RAT dbr:TCP_reset_attack dbr:Off-by-one_error dbr:1979_WCT_World_Doubles dbr:Ping_flood dbr:Port_scanner yago:Derring-do100043116 dbr:Browser_exploit dbr:Type_safety n10: dbr:Radio_jamming yago:Stunt100046344 yago:TourDeForce100047018 yago:Hit100043902 yago:Rally100045646 dbr:Metasploit_Project dbr:Proof-carrying_code dbr:1997_ANZ_Tasmanian_International_–_Doubles dbr:Flapping dbr:Microsoft_Security_Development_Lifecycle dbr:2014_Hobart_International_–_Doubles dbr:Referer_spoofing dbr:Raw_socket dbr:Back_Orifice dbr:XSS_worm dbr:Idle_scan dbr:1976_WCT_World_Doubles dbr:Hping n11: dbr:1973_WCT_World_Doubles dbr:Brute-force_attack dbr:SGML_entity dbr:Tabnabbing dbr:Heap_spraying dbr:Heap_overflow n12: dbr:Dictionary_attack dbr:ARP_spoofing dbr:2012_Copa_Sevilla_–_Doubles n13: n14: dbr:Heartbleed dbr:2012_Open_Castilla_y_León_–_Doubles dbr:Ping_of_death dbr:Vulnerability_database dbr:Virtual_machine_escape dbr:2012_World_Mixed_Doubles_Curling_Championship dbr:2012_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles dbr:Script_kiddie dbr:Memory_safety dbr:2013_World_Mixed_Doubles_Curling_Championship dbr:1999_ANZ_Tasmanian_International_–_Doubles dbr:Heap_feng_shui dbr:2001_ANZ_Tasmanian_International_–_Doubles dbr:Snarfing n15: dbr:DNS_rebinding dbr:Duqu dbr:Shellcode dbr:Man-in-the-middle_attack dbr:Email_bomb dbr:2009_Copa_Sevilla_–_Doubles dbr:Computer_security dbr:In-session_phishing dbr:Spamming dbr:Smudge_attack dbr:Browser_security dbr:Cross-zone_scripting n16: yago:WikicatComputerSecurityExploits dbr:Ultrasurf dbr:Threat_model dbr:1998_ANZ_Tasmanian_International_–_Doubles dbr:Social_engineering dbr:World_Mixed_Doubles_Curling_Championship dbr:2011_World_Mixed_Doubles_Curling_Championship n17: dbr:1978_WCT_World_Doubles dbr:Warchalking dbr:Cross-application_scripting dbr:Integer_overflow dbr:2011_Copa_Sevilla_–_Doubles dbr:Messaging_spam dbr:IP_address_spoofing dbr:WinNuke dbr:Dangling_pointer dbr:Low_Orbit_Ion_Cannon n18: dbr:Email_injection dbr:Intrusion_detection_system_evasion_techniques dbr:Virus_hoax dbr:Kali_Linux dbr:Content_sniffing dbr:Internet_security dbr:Cyber_Insider_Threat dbr:SMS_spoofing dbr:2009_Moorilla_Hobart_International_–_Doubles dbr:Rainbow_table dbr:Directory_traversal_attack dbr:Web_threat dbr:1983_WCT_World_Doubles n19: dbr:2013_Svijany_Open_–_Doubles dbr:1981_WCT_World_Doubles dbr:Phreaking dbr:Swatting dbr:JIT_spraying dbr:Stack_buffer_overflow n21: dbr:Cookiemonster_attack n23: dbr:Session_hijacking dbr:OWASP dbr:Cookie_stuffing dbr:1975_WCT_World_Doubles dbr:2010_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles dbr:2010_Open_Castilla_y_León_–_Doubles dbr:DSploit dbr:Replay_attack dbr:Broadcast_radiation dbr:Buffer_over-read dbr:Pass_the_hash dbr:2011_Caloundra_International_–_Doubles dbr:Code_injection dbr:Password_cracking dbr:Session_fixation dbr:Drive-by_download dbr:WCT_World_Doubles dbr:1985_WCT_World_Doubles dbr:HTTP_header_injection dbr:Email_spoofing dbr:Alphanumeric_shellcode n24: dbr:SMBRelay dbr:TR-069 n25:s_Doubles dbr:HTTP_cookie dbr:Phonological_change dbr:1995_Schweppes_Tasmanian_International_–_Doubles dbr:Mass_assignment_vulnerability dbr:2011_Open_Castilla_y_León_–_Doubles dbr:Internet_Relay_Chat_flood n26:s_Doubles dbr:W3af dbr:HTTP_Strict_Transport_Security dbr:Buffer_underrun dbr:Privilege_escalation dbr:Packet_analyzer dbr:Billion_laughs dbr:Reflected_DOM_Injection dbr:ICMP_tunnel dbr:John_the_Ripper n27: dbr:Blended_threat dbr:1996_Schweppes_Tasmanian_International_–_Doubles dbr:HTTP_response_splitting dbr:2009_World_Mixed_Doubles_Curling_Championship dbr:2010_World_Mixed_Doubles_Curling_Championship dbr:1974_WCT_World_Doubles dbr:NOP_slide dbr:2007_Moorilla_Hobart_International_–_Doubles dbr:Cold_boot_attack dbr:Predictable_serial_number_attack dbr:L-vocalization dbr:BackTrack dbr:XSA dbr:Null_character n28: dbr:Open_Source_Vulnerability_Database dbr:Voice_phishing dbr:Rootkit dbr:2013_Copa_Sevilla_–_Doubles dbr:Buffer_overflow dbr:Physical_information_security dbr:Denial-of-service_attack n29: dbr:MAC_spoofing dbr:Man-in-the-browser dbr:Fork_bomb dbr:Rogue_access_point dbr:MAC_flooding dbr:Return-to-libc_attack dbr:2013_Moorilla_Hobart_International_–_Doubles dbr:Protocol_spoofing dbr:TRESOR dbr:Nmap dbr:Webattacker dbr:CPLINK dbr:1980_WCT_World_Doubles n30:sk dbr:Security_Content_Automation_Protocol dbr:Inter-protocol_exploitation dbr:Session_poisoning dbr:War_dialing dbr:Return-oriented_programming dbr:Content_Security_Policy dbr:Acoustic_cryptanalysis n31:_attack dbr:Linux_kernel n32: dbr:Self-modifying_code dbr:1977_WCT_World_Doubles dbr:SYN_flood dbr:Brute-force_search dbr:1994_Tasmanian_International_–_Doubles dbr:Nikto_Web_Scanner n33: dbr:Source_code_virus dbr:Spambot dbr:Cyberwarfare dbr:Reflection_attack