Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
Cyberwarfare
An Entity of Type:
Concept
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
dbo:
wikiPageID
28844523
(xsd:integer)
dbo:
wikiPageRevisionID
970030772
(xsd:integer)
dbp:
wikiPageUsesTemplate
dbt
:Commons_category
dbt
:Portal
dbt
:See_also
dbt
:CatAutoTOC
dbt
:Cat_main
rdf:
type
skos
:Concept
rdfs:
label
Cyberwarfare
(en)
skos:
broader
dbc
:Battles_and_conflicts_without_fatalities
dbc
:Warfare_post-1945
dbc
:Cyberspace
dbc
:Warfare_by_type
dbc
:Information_Age
skos:
prefLabel
Cyberwarfare
(en)
prov:
wasDerivedFrom
wikipedia-en
:Category:Cyberwarfare?oldid=970030772&ns=14
is
dbo:
wikiPageWikiLink
of
dbr
:Proactive_cyber_defence
dbr
:Sandworm_(hacker_group)
dbr
:Elfin_Team
dbr
:NIS_Directive
dbr
:National_Cyber_Security_Centre_(Ireland)
dbr
:National_Cyber_Security_Division
dbr
:Berserk_Bear
dbr
:Denial-of-service_attack
dbr
:Alina_(malware)
dbr
:Alliance_for_Securing_Democracy
dbr
:Application_firewall
dbr
:List_of_cyber_warfare_forces
dbr
:List_of_data_breaches
dbr
:Patriotic_hacking
dbr
:Cyber-arms_industry
dbr
:Cyber-collection
dbr
:Cyber-security_regulation
dbr
:Cyber_Resilience_Review
dbr
:Cyber_Security_Center_of_the_Mongolian_Armed_Forces
dbr
:Cyber_espionage
dbr
:Cyber_force
dbr
:Cyber_resilience
dbr
:Cyber_spying
dbr
:Cyber_spying_on_universities
dbr
:Cyber_threat_intelligence
dbr
:Cyberattacks_on_Ukraine
dbr
:Cyberspace_Defense_Forces
dbr
:Cyberterrorism
dbr
:Cyberwarfare
dbr
:Cyberweapon
dbr
:Cyclops_Blink
dbr
:DDoS_attacks_during_the_October_2011_South_Korean_by-election
dbr
:DDoS_mitigation
dbr
:Vault_7
dbr
:Dexter_(malware)
dbr
:Duqu
dbr
:Information_assurance_vulnerability_alert
dbr
:Interest_Flooding_Attack
dbr
:Internet_security_awareness
dbr
:Signals_intelligence
dbr
:Communications_&_Information_Services_Corps
dbr
:Computer_security
dbr
:Corporate_warfare
dbr
:Cozy_Bear
dbr
:Estonian_Defence_League's_Cyber_Unit
dbr
:National_Cyber_Security_Centre_(New_Zealand)
dbr
:Web_threat
dbr
:PunkeyPOS_Malware
dbr
:Election_security
dbr
:Endgame,_Inc.
dbr
:General_Intelligence_and_Security_Service
dbr
:Botnet
dbr
:Political_repression_of_cyber-dissidents
dbr
:Tallinn_Manual
dbr
:Operations_Support_Branch
dbr
:2010_Japan–South_Korea_cyberwarfare
dbr
:2013_South_Korea_cyberattack
dbr
:Stuxnet
dbr
:Zerodium
dbr
:Hardware_backdoor
dbr
:Hardware_security
dbr
:Stars_virus
dbr
:Market_for_zero-day_exploits
dbr
:Rootkit
dbr
:Australian_Cyber_Collaboration_Centre
dbr
:W3af
dbr
:WabiSabiLabi
dbr
:WarVOX
dbr
:Wargame_(hacking)
dbr
:Hacking_Team
dbr
:2013_Singapore_cyberattacks
dbr
:APT40
dbr
:Agence_nationale_de_la_sécurité_des_systèmes_d'information
dbr
:Cyber_Security_Agency
dbr
:ECHELON
dbr
:Fancy_Bear
dbr
:Festi
dbr
:Fleet_Electronic_Warfare_Center
dbr
:Nitro_Zeus
dbr
:Norwegian_Cyber_Defence_Force
dbr
:Numbered_Panda
dbr
:PLA_Unit_61486
dbr
:Capture_the_flag_(cybersecurity)
dbr
:Careto_(malware)
dbr
:CenterPOS_Malware
dbr
:Centre_for_Cybersecurity_&_Cybercrime_Investigation
dbr
:FastPOS
dbr
:Hit-and-run_DDoS
dbr
:Katiba_des_Narvalos
dbr
:Ramsay_Malware
dbr
:Internet_outage
dbr
:Intervasion_of_the_UK
dbr
:Backoff
dbr
:Telecomix
dbr
:TheRealDeal
dbr
:Hyperwar
dbr
:State-sponsored_Internet_propaganda
dbr
:2018_SingHealth_data_breach
dbr
:Army_Signal_Command_Cybernetic_Security_Unit
dbr
:AF/91
dbr
:Advanced_persistent_threat
dbr
:Charming_Kitten
dbr
:TCP_reset_attack
dbr
:Trojan_horse_(computing)
dbr
:Xor_DDoS
dbr
:Yemen_Cyber_Army
dbr
:Aurora_Generator_Test
dbr
:Markus_Hess
dbr
:Bug_bounty_program
dbr
:Bug_poaching
dbr
:Bureau_121
dbr
:Software_Engineering_Institute
dbr
:Fifth-generation_warfare
dbr
:Fifth_Dimension_Operations
dbr
:FinFisher
dbr
:Great_Cannon
dbr
:Igor_Artimovich
dbr
:Industrial_espionage
dbr
:Information_warfare
dbr
:Military-digital_complex
dbr
:Network-centric_warfare
dbr
:Camfecting
dbr
:Shamoon
dbr
:Logic_bomb
dbr
:Russian_web_brigades
dbr
:Operation_High_Roller
dbr
:Lords_of_Dharmaraja
dbr
:Mahdi_(malware)
dbr
:Sheep_dip_(computing)
dbr
:Syrian_Electronic_Army
dbr
:Turla_(malware)
dbr
:Vulnerabilities_Equities_Process
dbr
:F._Lynn_McNulty
dbr
:IT_security_standards
dbr
:IWar
dbr
:United_States_intelligence_operations_abroad
dbr
:Russian–Ukrainian_cyberwarfare
dbr
:Evil_maid_attack
dbr
:Firewall_(computing)
dbr
:Flame_(malware)
dbr
:GhostNet
dbr
:NIST_Cybersecurity_Framework
dbr
:National_Critical_Information_Infrastructure_Protection_Centre
dbr
:National_Cyberdefence_Centre
dbr
:Rocket_Kitten
dbr
:Schmitt_Analysis
dbr
:Unit_180
dbr
:Shadow_Network
dbr
:MultigrainMalware
dbr
:Pipedream_(toolkit)
dbr
:Stateful_firewall
dbr
:The_Shadow_Brokers
dbr
:SIGINT_Activity_Designator
is
dcterms:
subject
of
dbr
:Proactive_cyber_defence
dbr
:Sandworm_(hacker_group)
dbr
:Elfin_Team
dbr
:NIS_Directive
dbr
:National_Cyber_Security_Centre_(Ireland)
dbr
:National_Cyber_Security_Division
dbr
:Berserk_Bear
dbr
:Denial-of-service_attack
dbr
:Alina_(malware)
dbr
:Alliance_for_Securing_Democracy
dbr
:Application_firewall
dbr
:List_of_cyber_warfare_forces
dbr
:List_of_data_breaches
dbr
:Patriotic_hacking
dbr
:Cyber-arms_industry
dbr
:Cyber-collection
dbr
:Cyber-security_regulation
dbr
:Cyber_Resilience_Review
dbr
:Cyber_Security_Center_of_the_Mongolian_Armed_Forces
dbr
:Cyber_espionage
dbr
:Cyber_force
dbr
:Cyber_resilience
dbr
:Cyber_spying
dbr
:Cyber_spying_on_universities
dbr
:Cyber_threat_intelligence
dbr
:Cyberattacks_on_Ukraine
dbr
:Cyberspace_Defense_Forces
dbr
:Cyberterrorism
dbr
:Cyberwarfare
dbr
:Cyberweapon
dbr
:Cyclops_Blink
dbr
:DDoS_attacks_during_the_October_2011_South_Korean_by-election
dbr
:DDoS_mitigation
dbr
:Vault_7
dbr
:Dexter_(malware)
dbr
:Duqu
dbr
:Information_assurance_vulnerability_alert
dbr
:Interest_Flooding_Attack
dbr
:Internet_security_awareness
dbr
:Signals_intelligence
dbr
:Communications_&_Information_Services_Corps
dbr
:Computer_security
dbr
:Corporate_warfare
dbr
:Cozy_Bear
dbr
:Estonian_Defence_League's_Cyber_Unit
dbr
:National_Cyber_Security_Centre_(New_Zealand)
dbr
:Web_threat
dbr
:PunkeyPOS_Malware
dbr
:Election_security
dbr
:Endgame,_Inc.
dbr
:General_Intelligence_and_Security_Service
dbr
:Botnet
dbr
:Political_repression_of_cyber-dissidents
dbr
:Tallinn_Manual
dbr
:Operations_Support_Branch
dbr
:2010_Japan–South_Korea_cyberwarfare
dbr
:2013_South_Korea_cyberattack
dbr
:Stuxnet
dbr
:Zerodium
dbr
:Hardware_backdoor
dbr
:Hardware_security
dbr
:Stars_virus
dbr
:Market_for_zero-day_exploits
dbr
:Rootkit
dbr
:Australian_Cyber_Collaboration_Centre
dbr
:W3af
dbr
:WabiSabiLabi
dbr
:WarVOX
dbr
:Wargame_(hacking)
dbr
:Hacking_Team
dbr
:2013_Singapore_cyberattacks
dbr
:APT40
dbr
:Agence_nationale_de_la_sécurité_des_systèmes_d'information
dbr
:Cyber_Security_Agency
dbr
:ECHELON
dbr
:Fancy_Bear
dbr
:Festi
dbr
:Fleet_Electronic_Warfare_Center
dbr
:Nitro_Zeus
dbr
:Norwegian_Cyber_Defence_Force
dbr
:Numbered_Panda
dbr
:PLA_Unit_61486
dbr
:Capture_the_flag_(cybersecurity)
dbr
:Careto_(malware)
dbr
:CenterPOS_Malware
dbr
:Centre_for_Cybersecurity_&_Cybercrime_Investigation
dbr
:FastPOS
dbr
:Hit-and-run_DDoS
dbr
:Katiba_des_Narvalos
dbr
:Ramsay_Malware
dbr
:Internet_outage
dbr
:Intervasion_of_the_UK
dbr
:Backoff
dbr
:Telecomix
dbr
:TheRealDeal
dbr
:Hyperwar
dbr
:State-sponsored_Internet_propaganda
dbr
:2018_SingHealth_data_breach
dbr
:Army_Signal_Command_Cybernetic_Security_Unit
dbr
:AF/91
dbr
:Advanced_persistent_threat
dbr
:Charming_Kitten
dbr
:TCP_reset_attack
dbr
:Trojan_horse_(computing)
dbr
:Xor_DDoS
dbr
:Yemen_Cyber_Army
dbr
:Aurora_Generator_Test
dbr
:Markus_Hess
dbr
:Bug_bounty_program
dbr
:Bug_poaching
dbr
:Bureau_121
dbr
:Software_Engineering_Institute
dbr
:Fifth-generation_warfare
dbr
:Fifth_Dimension_Operations
dbr
:FinFisher
dbr
:Great_Cannon
dbr
:Igor_Artimovich
dbr
:Industrial_espionage
dbr
:Information_warfare
dbr
:Military-digital_complex
dbr
:Network-centric_warfare
dbr
:Camfecting
dbr
:Shamoon
dbr
:Logic_bomb
dbr
:Russian_web_brigades
dbr
:Operation_High_Roller
dbr
:Lords_of_Dharmaraja
dbr
:Mahdi_(malware)
dbr
:Sheep_dip_(computing)
dbr
:Syrian_Electronic_Army
dbr
:Turla_(malware)
dbr
:Vulnerabilities_Equities_Process
dbr
:F._Lynn_McNulty
dbr
:IT_security_standards
dbr
:IWar
dbr
:United_States_intelligence_operations_abroad
dbr
:Russian–Ukrainian_cyberwarfare
dbr
:Evil_maid_attack
dbr
:Firewall_(computing)
dbr
:Flame_(malware)
dbr
:GhostNet
dbr
:NIST_Cybersecurity_Framework
dbr
:National_Critical_Information_Infrastructure_Protection_Centre
dbr
:National_Cyberdefence_Centre
dbr
:Rocket_Kitten
dbr
:Schmitt_Analysis
dbr
:Unit_180
dbr
:Shadow_Network
dbr
:MultigrainMalware
dbr
:Pipedream_(toolkit)
dbr
:Stateful_firewall
dbr
:The_Shadow_Brokers
dbr
:SIGINT_Activity_Designator
is
skos:
broader
of
dbc
:Cyberattack_gangs
dbc
:Cyberwarfare_in_popular_culture
dbc
:Cyberwarfare_by_country
dbc
:Botnets
dbc
:Cryptography
dbc
:Information_operations_and_warfare
dbc
:Computer_security_exploits
dbc
:Cloud_infrastructure_attacks_and_failures
dbc
:Documentary_films_about_cyberwarfare
dbc
:Internet_manipulation_and_propaganda
dbc
:Cyberattacks
dbc
:Computer_network_security
dbc
:Encryption_devices
dbc
:Security_engineering
dbc
:Malware_targeting_industrial_control_systems
dbc
:Espionage
dbc
:Types_of_cyberattacks
dbc
:Computer_security
dbc
:Advanced_persistent_threat
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License