Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
Cybercrime
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
dbkwik.webdatacommons.org
associated with source
dataset(s)
Attributes
Values
rdfs:label
Cybercrime
is
dcterms:subject
of
Jamming
Computer log collector
Global Cybercrime: The Interplay of Politics and Law
Point of Sale Intrusion
Estonia cyberattack
Cryptolocker
Threat
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
The Phishing Guide: Understanding & Preventing Phishing Attacks
Arab Convention on Combating Information Technology Offences
Network behavioral analysis
Pseudoflaw
Flood attack
CyberScience Laboratory
State cyberstalking and cyberharassment laws
Trophy grabbing
Northern California Computer Crime Task Force
LulzSec
Terrorist Capabilities for Cyberattack: Overview and Policy Issues
Botnet code
Report on Phishing: A Report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States
Security incident
Commonwealth Cybercrime Initiative
Form grabbing
Harmonizing National Legal Approaches on Cybercrime
Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems
Police Central e-crime Unit
Aggravated identity theft
StopBullying.gov
Wireless Keystroke Logger Disguised as USB Device Charger Targets Wireless Keyboards
Misappropriation
UCD Centre for Cybersecurity and Cybercrime Investigation
Report of the Open-Ended Intergovernmental Expert Group of the Comprehensive Study of the Problem of Cybercrime and Responses to it by Member States, the International Community and Private Sector
Kill chain
ILoveYou
National Cyberdefence Centre
Attack signature
European External Action Service
Online Child Exploitation Across New Zealand
Verbose message
Report from the Commission to the Council based on Article 12 of the Council Framework Decision of 24 February 2005 on attacks against information systems
National Security Business Alliance Council-Information Technology
Cyber Defence Management Authority
Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime
Ransomware and Recent Variants
Melissa virus
Cross-site scripting
Coast Guard Criminal investigative Service
Cybercrime
Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
Canada’s Cyber Security Strategy
Defense Cyber Crime Center
Keyword list blocking
High-technology crime
NSA/CSS Threat Operations Center
Internet Fraud Complaint Center
Cyber enticement
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
Stanford Draft International Convention to Enhance Protection from Cyber Crime and Terrorism
Digital Intelligence and Investigation Directorate
Recent Cyber Intrusion Events Directed Toward Retail Firms
Hypervisor attack
High tech crime tools
Ransomware on the Rise: FBI and Partners Working to Combat This Cyber Threat
2015 Data Breach Investigations Report
National Centre for Countering On Line Child Pornography
Internet Crime Reporting Online System
E-mail account compromise
Privacy and Cyber Crime Institute
Command and control server
Identifying Hoaxes and Urban Legends
Octopus Conference 2012
Polymorphic malware
CyFin
G-8
Significant Cyber Events Since 2006
Identity Theft Assistance Center
Internet Crimes Against Children Task Force
Dealing with Cyberbullies
The Department of Energy's July 2013 Cyber Security
State laws related to electronic solicitation or luring of children
The Hacker's Handbook
Juice jacking
CyberTipline II
Combating Child Pornography: Steps Are Needed to Ensure That Tips to Law Enforcement Are Useful and Forensic Examinations Are Cost Effective
Holiday Phishing and Online Cyber Scams
AusCERT
High-tech crime
Replay attack
Hidden dialer
A Thin Line
Octopus Conferences
Aurora Generator Test
Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
Explanatory Report to the Council of Europe Convention on Cybercrime
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress
APEC Cybersecurity Strategy
Cyberhooliganism
Interpol European Working Parties on IT Crime
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 9
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software