This HTML5 document contains 23 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n4http://dbkwik.webdatacommons.org/resource/RBWBuPuqL6CJ9-wjQXTgmQ==
dctermshttp://purl.org/dc/terms/
n11http://dbkwik.webdatacommons.org/ontology/
n3http://dbkwik.webdatacommons.org/military/property/
n8http://dbkwik.webdatacommons.org/resource/2LVZd3BbIXEQtAgNrm-uDQ==
n13http://dbkwik.webdatacommons.org/resource/UnDipahpDqhUBQHIT-NMRQ==
n20http://dbkwik.webdatacommons.org/resource/xmZ8NJkc0PAvUcoRG7-KIQ==
n9http://dbkwik.webdatacommons.org/resource/Iu_7pthWpF2cD2ygBQRcBw==
n16http://dbkwik.webdatacommons.org/resource/Bg1pOYny1Hey7xc3T3ThDg==
n6http://dbkwik.webdatacommons.org/resource/e-2xcbTE91wJ3xgnapoxAw==
n22http://dbkwik.webdatacommons.org/resource/8BFkaY3ZQvJgS7QpJwMw1g==
n12http://dbkwik.webdatacommons.org/itlaw/property/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n15http://dbkwik.webdatacommons.org/resource/0CUW6saOy3rivYGOiWhP7g==
n26http://dbkwik.webdatacommons.org/resource/rTHEQj0kcV4VJ42fbLXJbQ==
n23http://dbkwik.webdatacommons.org/resource/rnvnddlA753uo3kHZyN8wQ==
n25http://dbkwik.webdatacommons.org/resource/pTEKXoXwy_QJD-cbbKl3EQ==
n10http://dbkwik.webdatacommons.org/resource/6qW3NdNLjugIfNdJf7vb0A==
n24http://dbkwik.webdatacommons.org/resource/ODD2urn6xOTu5tfNx3dKHA==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n21http://dbkwik.webdatacommons.org/resource/AaGpNMKXeCEx6k1ovZIRVg==
owlhttp://www.w3.org/2002/07/owl#
n14http://dbkwik.webdatacommons.org/resource/BzA6jT1abKu74Zs6mjCzYg==
n2http://dbkwik.webdatacommons.org/resource/Jb9Wfz1M7CLejyJIpbRIvw==
xsdhhttp://www.w3.org/2001/XMLSchema#
dbrhttp://dbpedia.org/resource/
n17http://dbkwik.webdatacommons.org/resource/Pqv16rRY2mX1evSPgXcqkQ==
Subject Item
n2:
rdfs:label
Traffic analysis
rdfs:comment
Traffic analysis is Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security.
owl:sameAs
dbr:Traffic_analysis
dcterms:subject
n8: n9: n10: n14: n16: n17: n22:
n3:wikiPageUsesTemplate
n4: n6: n15: n20: n21: n23: n24: n25: n26:
n12:wikiPageUsesTemplate
n13:
n11:abstract
Traffic analysis is Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security. Traffic analysis tasks may be supported by dedicated computer software programs, including commercially available programs such as those offered by i2, Visual Analytics, Memex, Orion Scientific, Pacific Northwest National Labs, Genesis EW's GenCOM Suite, SynerScope and others. Advanced traffic analysis techniques may include various forms of social network analysis.