DBpedia – Linked Data Fragments

DBpedia 2016-04

Query DBpedia 2016-04 by triple pattern

Matches in DBpedia 2016-04 for { ?s ?p "A list of cyber attack threat trends is presented in alphabetical order. These methods were used between the 1990s and 2015. Analysis of vulnerabilities in compiled software without source code Anti-forensic techniques Automated probes and scans Automated widespread attacks Cyber-threats & bullying (not illegal in all jurisdictions) Distributed attack tools Email propagation of malicious code Executable code attacks (against browsers) GUI intrusion tools Industrial espionage Internet social engineering attacks Network sniffers Packet spoofing Session-hijacking Sophisticated botnet command and control attacks \"Stealth\" and other advanced scanning techniques Targeting of specific users Widespread attacks on DNS infrastructure Widespread attacks using NNTP to distribute attack Wide-scale trojan distribution Wide-scale use of worms Widespread, distributed denial-of-service attacks Windows-based remote access trojans (Back Orifice)↑"@en }

Showing triples 1 to 1 of 1 with 100 triples per page.