This HTML5 document contains 7 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n4http://dbkwik.webdatacommons.org/resource/UT7ZaDcizxxAtX3ZWrYD2A==
n5http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n6http://dbkwik.webdatacommons.org/resource/lqAJD5CoJiH4QkuGOupOvg==
n2http://dbkwik.webdatacommons.org/resource/ZeT1J4nvfHkb19RDT2k0jg==
n9http://dbkwik.webdatacommons.org/resource/071e6SjTuCXXDqk7BtwB_w==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
xsdhhttp://www.w3.org/2001/XMLSchema#
n7http://dbkwik.webdatacommons.org/resource/Pqv16rRY2mX1evSPgXcqkQ==
Subject Item
n2:
rdfs:label
Malicious attack
rdfs:comment
A malicious attack is an attack on a computer system or network asset that exploits a vulnerability in the system.
dcterms:subject
n4: n6: n7: n9:
n5:abstract
A malicious attack is an attack on a computer system or network asset that exploits a vulnerability in the system.