Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
http://dbpedia.org/class/yago/Feat100036762
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
rdfs:
subClassOf
yago
:Accomplishment100035189
owl:
equivalentClass
yago-res
:wordnet_feat_100036762
is
rdf:
type
of
dbr
:BREACH_(security_exploit)
dbr
:Pronunciation_of_English_⟨th⟩
dbr
:English-language_vowel_changes_before_historic_/l/
dbr
:MAC_spoofing
dbr
:Patched_(malware)
dbr
:WCT_World_Doubles
dbr
:2007_Moorilla_Hobart_International_–_Doubles
dbr
:2008_World_Mixed_Doubles_Curling_Championship
dbr
:2009_Copa_Sevilla_–_Doubles
dbr
:2009_Moorilla_Hobart_International_–_Doubles
dbr
:2009_Open_Castilla_y_León_–_Doubles
dbr
:2009_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles
dbr
:2009_World_Mixed_Doubles_Curling_Championship
dbr
:2010_Copa_Sevilla_–_Doubles
dbr
:2010_Moorilla_Hobart_International_–_Doubles
dbr
:2010_Open_Castilla_y_León_–_Doubles
dbr
:2010_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles
dbr
:2010_World_Mixed_Doubles_Curling_Championship
dbr
:2011_Caloundra_International_–_Doubles
dbr
:2011_Copa_Sevilla_–_Doubles
dbr
:2011_Moorilla_Hobart_International_–_Doubles
dbr
:2011_Open_Castilla_y_León_–_Doubles
dbr
:2011_Open_Diputación_Ciudad_de_Pozoblanco_–_Men's_Doubles
dbr
:2011_Open_Diputación_Ciudad_de_Pozoblanco_–_Women's_Doubles
dbr
:2011_World_Mixed_Doubles_Curling_Championship
dbr
:2012_Caloundra_International_–_Doubles
dbr
:2012_Copa_Sevilla_–_Doubles
dbr
:2012_Moorilla_Hobart_International_–_Doubles
dbr
:2012_Open_Castilla_y_León_–_Doubles
dbr
:2012_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles
dbr
:2012_World_Mixed_Doubles_Curling_Championship
dbr
:2013_Copa_Sevilla_–_Doubles
dbr
:2013_Moorilla_Hobart_International_–_Doubles
dbr
:2013_Open_Castilla_y_León_–_Doubles
dbr
:Denial-of-service_attack
dbr
:Arbitrary_code_execution
dbr
:John_the_Ripper
dbr
:Pharming
dbr
:Return-oriented_programming
dbr
:Cyber_Insider_Threat
dbr
:Cyberwarfare
dbr
:DNS_rebinding
dbr
:Ultrasurf
dbr
:Uncontrolled_format_string
dbr
:Defensive_computing
dbr
:Duqu
dbr
:Integer_overflow
dbr
:Inter-protocol_exploitation
dbr
:Internet_security
dbr
:Intrusion_detection_system_evasion_techniques
dbr
:JIT_spraying
dbr
:L-vocalization
dbr
:Radio_jamming
dbr
:SQL_injection
dbr
:Predictable_serial_number_attack
dbr
:1976_WCT_World_Doubles
dbr
:1977_WCT_World_Doubles
dbr
:1978_WCT_World_Doubles
dbr
:1979_WCT_World_Doubles
dbr
:1980_WCT_World_Doubles
dbr
:1981_WCT_World_Doubles
dbr
:1982_WCT_World_Doubles
dbr
:1983_WCT_World_Doubles
dbr
:1984_WCT_World_Doubles
dbr
:1985_WCT_World_Doubles
dbr
:1986_WCT_World_Doubles
dbr
:1994_Tasmanian_International_–_Doubles
dbr
:1995_Schweppes_Tasmanian_International_–_Doubles
dbr
:Computer_security
dbr
:Content_Security_Policy
dbr
:Cookie_stuffing
dbr
:DSploit
dbr
:SYN_flood
dbr
:System_Reconfiguration_Attacks
dbr
:Vulnerability_database
dbr
:Vulnerability_(computing)
dbr
:Web_threat
dbr
:English-language_vowel_changes_before_historic_/r/
dbr
:Content_sniffing
dbr
:Cookiemonster_attack
dbr
:Copy_attack
dbr
:Cross-application_scripting
dbr
:Cross-site_cooking
dbr
:Cross-site_request_forgery
dbr
:Cross-site_scripting
dbr
:Cross-site_tracing
dbr
:Cross-zone_scripting
dbr
:Dangling_pointer
dbr
:Riskware
dbr
:Tabnabbing
dbr
:1973_WCT_World_Doubles
dbr
:1974_WCT_World_Doubles
dbr
:1975_WCT_World_Doubles
dbr
:Alphanumeric_shellcode
dbr
:Linux_kernel
dbr
:Low_Orbit_Ion_Cannon
dbr
:Slow_loris
dbr
:Stuxnet
dbr
:Clear_channel_assessment_attack
dbr
:Email_bomb
dbr
:Email_injection
dbr
:Email_spoofing
dbr
:Fault_injection
dbr
:Clickjacking
dbr
:Davies'_attack
dbr
:Keystroke_logging
dbr
:Pass_the_hash
dbr
:Payload_(computing)
dbr
:Phishing
dbr
:Proof-carrying_code
dbr
:Proof_of_concept
dbr
:Messaging_spam
dbr
:Protocol_spoofing
dbr
:SMS_spoofing
dbr
:Spamming
dbr
:Spoofed_URL
dbr
:Mass_assignment_vulnerability
dbr
:Rootkit
dbr
:Voice_phishing
dbr
:1996_Schweppes_Tasmanian_International_–_Doubles
dbr
:1997_ANZ_Tasmanian_International_–_Doubles
dbr
:1998_ANZ_Tasmanian_International_–_Doubles
dbr
:1999_ANZ_Tasmanian_International_–_Doubles
dbr
:2001_ANZ_Tasmanian_International_–_Doubles
dbr
:BackTrack
dbr
:Broadcast_radiation
dbr
:Brute-force_attack
dbr
:W3af
dbr
:Dolev–Yao_model
dbr
:Drive-by_download
dbr
:HTTP_Strict_Transport_Security
dbr
:HTTP_header_injection
dbr
:HTTP_response_splitting
dbr
:Heap_feng_shui
dbr
:Heap_overflow
dbr
:Heap_spraying
dbr
:Fakesysdef_(malware)
dbr
:Login_spoofing
dbr
:Rogue_access_point
dbr
:2013_Svijany_Open_–_Doubles
dbr
:2013_World_Mixed_Doubles_Curling_Championship
dbr
:2014_Hobart_International_–_Doubles
dbr
:Advance-fee_scam
dbr
:Flapping
dbr
:Nmap
dbr
:Null_character
dbr
:Billion_laughs
dbr
:Dictionary_attack
dbr
:Directory_traversal_attack
dbr
:Fast_flux
dbr
:Fork_(file_system)
dbr
:Fork_bomb
dbr
:Form_grabbing
dbr
:Frame_injection
dbr
:Password_cracking
dbr
:Privilege_escalation
dbr
:SGML_entity
dbr
:Internet_Relay_Chat_flood
dbr
:MAC_flooding
dbr
:Session_fixation
dbr
:Rainbow_table
dbr
:Reflected_DOM_Injection
dbr
:Replay_attack
dbr
:HTTP_cookie
dbr
:Heartbleed
dbr
:Back_Orifice
dbr
:Backdoor_(computing)
dbr
:Covert_channel
dbr
:WinNuke
dbr
:XSA
dbr
:TR-069
dbr
:TRESOR
dbr
:Th-stopping
dbr
:Armitage_(computing)
dbr
:ARP_spoofing
dbr
:Acoustic_cryptanalysis
dbr
:Kali_Linux
dbr
:Blended_threat
dbr
:Bluejacking
dbr
:Swatting
dbr
:TCP_reset_attack
dbr
:Code_injection
dbr
:Cold_boot_attack
dbr
:Threat_(computer)
dbr
:Trojan_horse_(computing)
dbr
:ZMW_attack
dbr
:Zeus_(malware)
dbr
:Mixed_threat_attack
dbr
:Ping_of_death
dbr
:Reflection_attack
dbr
:Relay_attack
dbr
:Astalavista.box.sk
dbr
:Buffer_over-read
dbr
:Buffer_overflow
dbr
:Buffer_underrun
dbr
:CPLINK
dbr
:Phonological_change
dbr
:Phreaking
dbr
:Social_jacking
dbr
:File_inclusion_vulnerability
dbr
:Hping
dbr
:Idle_scan
dbr
:Kismet_(software)
dbr
:Metasploit_Project
dbr
:Browser_exploit
dbr
:Browser_hijacking
dbr
:Browser_security
dbr
:Brute-force_search
dbr
:OWASP
dbr
:Off-by-one_error
dbr
:Open_Source_Vulnerability_Database
dbr
:Race_condition
dbr
:Self-modifying_code
dbr
:World_Mixed_Doubles_Curling_Championship
dbr
:Spambot
dbr
:Session_hijacking
dbr
:Man-in-the-browser
dbr
:Man-in-the-middle_attack
dbr
:Memory_safety
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:Security_Content_Automation_Protocol
dbr
:Type_safety
dbr
:Port_scanner
dbr
:Shoulder_surfing_(computer_security)
dbr
:Smudge_attack
dbr
:Smurf_attack
dbr
:Snarfing
dbr
:Social_engineering
dbr
:Virtual_machine_escape
dbr
:War_dialing
dbr
:Warchalking
dbr
:Source_code_virus
dbr
:Virus_hoax
dbr
:Symlink_race
dbr
:Shellcode
dbr
:Exploit_(computer_security)
dbr
:FTP_bounce_attack
dbr
:ICMP_tunnel
dbr
:IDN_homograph_attack
dbr
:IP_address_spoofing
dbr
:Improper_input_validation
dbr
:In-session_phishing
dbr
:Script_kiddie
dbr
:Pre-play_attack
dbr
:Register_spring
dbr
:Stack_buffer_overflow
dbr
:Rogue_DHCP
dbr
:Time_of_check_to_time_of_use
dbr
:The_Open_Organisation_Of_Lockpickers
dbr
:Evasion_(network_security)
dbr
:Evil_twin_(wireless_networks)
dbr
:Flame_(malware)
dbr
:Gh0st_RAT
dbr
:NOP_slide
dbr
:Threat_model
dbr
:Zombie_(computer_science)
dbr
:Physical_information_security
dbr
:Ping_flood
dbr
:Zero-day_(computing)
dbr
:Session_poisoning
dbr
:Warzapping
dbr
:Packet_analyzer
dbr
:TCP_sequence_prediction_attack
dbr
:Return-to-libc_attack
dbr
:SMBRelay
dbr
:Referer_spoofing
dbr
:AirSnort
dbr
:Raw_socket
dbr
:Webattacker
dbr
:XSS_worm
dbr
:Th-fronting
dbr
:Nikto_Web_Scanner
dbr
:GetAdmin
is
rdfs:
subClassOf
of
yago
:WikicatComputerSecurityExploits
yago
:WikicatWebSecurityExploits
yago
:Derring-do100043116
yago
:Hit100043902
yago
:Rally100045646
yago
:WikicatInjectionExploits
yago
:Stunt100046344
yago
:TourDeForce100047018
yago
:WikicatPrivilegeEscalationExploits
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License