This HTML5 document contains 6 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n8http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n2http://dbkwik.webdatacommons.org/resource/0E8BrR9Kr-7Npzt-RKJYEg==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n4http://dbkwik.webdatacommons.org/resource/lqAJD5CoJiH4QkuGOupOvg==
n5http://dbkwik.webdatacommons.org/resource/071e6SjTuCXXDqk7BtwB_w==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
xsdhhttp://www.w3.org/2001/XMLSchema#
n7http://dbkwik.webdatacommons.org/resource/Pqv16rRY2mX1evSPgXcqkQ==
Subject Item
n2:
rdfs:label
Low-interaction honeypot
rdfs:comment
Low-interaction honeypots emulates major vulnerabilities of the Microsoft operating systems. They can quickly detect attacks and process them. They record the time, communication protocols, source IP, source port, destination IP, destination port, and exploit type for each attack.
dcterms:subject
n4: n5: n7:
n8:abstract
Low-interaction honeypots emulates major vulnerabilities of the Microsoft operating systems. They can quickly detect attacks and process them. They record the time, communication protocols, source IP, source port, destination IP, destination port, and exploit type for each attack.