Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
Terrorism
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
Terrorism
is
dcterms:subject
of
Terrorist Identities Group
Social media tools
Situational Information Report
Cyberfunding
Information Sharing Environment: Better Road Map Needed to Guide Implementation and Investments
New York State Intelligence Center
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
Vulnerability Assessment of Federal Facilities
Nationwide SAR Initiative
Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
National Counterintelligence Board
The Attorney General's Guidelines for Domestic FBI Operations
Protecting America's Freedom in the Information Age
Physical attack
Cyber Terror Response Center
Presidential Decision Directives
National Joint Terrorism Task Force
Agent Provocateur
Statewide Communication Interoperability Plans
Protection
Program Manager
Terrorist activity
Terrorist site
DCI Counterterrorist Center
National Counter-Terrorism Committee
Terrorism-related information
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
Cyberhooliganism
Counterterrorism Division
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
Numerical Integrated Processing System
High Terrorist Factor
Executive Order 13356
24 Hour Log
Terrorism Watch List
Terrorist group
Combating Terrorism Technical Support Office
Upstate New York Regional Intelligence Center
ISE-Suspicious Activity Report
Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
Gateway Information Sharing Initiative
Terrorist organization
Hybrid threat
Antiterrorism risk management
International terrorist
Weapons of Mass Destruction Information
Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
Federal Support for and Involvement in State and Local Fusion Centers
Terrorists and the Internet
Check the Web
Information fusion
Random attack
National Counterterrorism Center Online
Scalable Social Network Analysis
Intelligence Study
Asymmetric attack
Cybercrime, Cyberterrorism, Cyberwarfare, Averting an Electronic Waterloo
Domestic counterterrorism
Digital Outreach Team
Counterterrorism Security Group
Cyberterrorism Defense Initiative
Multi-State Information Sharing and Analysis Center
Coordinated cyber-physical attack
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
Global War On Terror
Arrival and Departure Information System
Mobilizing Information to Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment
Weapon of mass destruction
9/11 Commission Recommendations: A Civil Liberties Oversight Board
Information Warfare: An Analysis of the Threat of Cyber Terrorism Towards the US Critical Infrastructure
Foreign terrorist organization
Arizona Fusion Center
Homeland Security Presidential Directive 6
Asymmetric threat
Biometric Center of Excellence
Behavioral surveillance
The Use of the Internet for Terrorist Purposes
Catastrophic incident
Contest
Man-made unintentional threat
Homeland Security: Better Use of Terrorist Watchlist Information and Improvements in Deployment of Passenger Checkpoint Technologies Could Further Strengthen Security
Dead dropping
Evidence Extraction and Link Discovery
Environmental Response Laboratory Network
Common Terrorism Information Sharing Standards
Cyberterrorist
Counterterrorism
Homeland Security Presidential Directive 12
Joint Internet Centre
Terrorist Identities Datamart Environment (TIDE) Fact Sheet
Counter-insurgency
Information Assurance Directorate
Executive Order 13311
Executive Order 13292
International Multilateral Partnership Against Cyber Threats
Intelligence Memorandum
Alerts, Warnings, and Notifications
National Counterproliferation Center
Threat focus cell
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 3
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software