Vocabs
Terms
Agents
SPARQL/Dump
Terms
24
results
stac:Flooding
(
stac
)
0.121
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#Flooding
dce:description
See Paper: Survey
of
Security and Privacy Issues,
of
Internet
of
Things [Borgohain et al. 2015]
@en
stac:ModeOperation
(
stac
)
0.093
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#ModeOperation
rdfs:label
Mode
of
operation
@en
rdfs:comment
A mode
of
operation describes the process
of
encrypting each
of
block cipher.
@en
stac:isVulnerabilityOf
(
stac
)
0.091
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#isVulnerabilityOf
rdfs:label
is Vulnerability
Of
@en
rdfs:comment
. For example, the Denial
of
Service is difficult to
@en
localName
isVulnerabilityOf
stac:Virus
(
stac
)
0.086
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#Virus
dce:description
technology [Xenakis 2006], Paper: Survey
of
Security, and Privacy Issues
of
Internet
of
Things [Borgohain et al. 2015]
@en
stac:Antivirus
(
stac
)
0.071
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#Antivirus
dce:description
See Paper: A study
of
information security for
@en
stac:KeyManagement
(
stac
)
0.041
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#KeyManagement
rdfs:comment
kinds
of
cryptographic keys to nodes in the network.
@en
dce:description
kinds
of
cryptographic keys to nodes in the network.
@en
stac:NegativeFeature
(
stac
)
0.020
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#NegativeFeature
rdfs:comment
Negative Feature
of
security mechanisms
@en
stac:PositiveFeature
(
stac
)
0.020
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#PositiveFeature
rdfs:comment
Positive Feature
of
security mechanisms
@en
stac:ManetAttack
(
stac
)
0.012
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#ManetAttack
rdfs:comment
-configuring network
of
mobile devices connected.
@en
stac:ICV
(
stac
)
0.011
n/a (use in LOD)
http://securitytoolbox.appspot.com/stac#ICV
rdfs:comment
The purpose
of
this value is to enable the, receiver to detect any malicious modifications
of
the message by an attacker.
@en
1
2
3