Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
Malware
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
134.155.108.49:8890
associated with source
dataset(s)
Attributes
Values
rdfs:label
Malware
is
dcterms:subject
of
Traitorware
Signature scanning and algorithmic detection
Malicious Software (Malware): A Security Threat to the Internet Economy
Spyware
Cryptolocker
Virus Generator
Antispyware software
Network security specialist
Login-spoofing program
Malicious bot
Study on the Financial Aspects of Network Security: Malware and Spam
Microsoft Malware Protection Center Glossary
Flame
Ignalina nuclear power plant
Form grabbing
Compiled virus
Messaging, Malware and Mobile Anti-Abuse Working Group
Hacking motives
Kill chain
ILoveYou
Malware creation tool
Computer Virus Attacks
State spyware laws
Hidden code
Ransomware and Recent Variants
Melissa virus
Blaster worm
Dexter
Recent Cyber Intrusion Events Directed Toward Retail Firms
Containment
Pentagon
Ransomware on the Rise: FBI and Partners Working to Combat This Cyber Threat
Polymorphic malware
Sobig
Identification tool
Floodnet
Microsoft Malware Protection Center
Holiday Phishing and Online Cyber Scams
AusCERT
Aurora Generator Test
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
Boot sector virus
Scareware
Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
Worm
Threat landscape
Recommendations for the Remediation of Bots in ISP Networks
Scores virus
Data injection
Screen scraper
Conficker
ACSC 2015 Threat Report
Variant
Gray-hat hacker
Economic denial of service
Man-in-the-browser attack
Living
Explore.Zip worm
Cyber Clean Center
Stoned
McAfee Labs
Back Door
LoveLetter worm
Alert level
Multifunction Printer Vulnerabilities
Coordinating Virus and Spyware Defense
Letter bomb
Phishing kit
Ghostware
Botnets as a Vehicle for Online Crime
Dropper
Remote
Malware Lab Network
Working Group 7 Botnet Remediation
The Fight Against the Threat from Botnets
Creeper virus
Chernobyl virus
CryptoWall
Remote access trojan
Malware
Malicious attack
Low-interaction honeypot
Vector
Infected File
VSkimmer
Masquerader
Self-replication
How to Protect Your Networks from Ransomware
Infected computer
Sandworm
Malicious code
Botnets: Measurement, Detection, Disinfection and Defence
Mirai
Web client attack
CERT.Brazil
Cybersecurity: Data, Statistics, and Glossaries
Mydoom
Stealth virus
NIST Special Publication 800-5
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 4
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software