Classes (115)

DLTOntology:API
DLTOntology:APIAttack
DLTOntology:APIVulnerability
DLTOntology:AccessControlAttack
DLTOntology:ArtificialIntelligence
DLTOntology:Attack
DLTOntology:AuditTrail
DLTOntology:BestPractice
DLTOntology:BusinessProcesses
DLTOntology:BusinessSector
DLTOntology:BusinessTransportation
DLTOntology:ConsensusAlgorithm
DLTOntology:ConsensusAttack
DLTOntology:ConsensusVulnerabiltiy
DLTOntology:ContractualUse
DLTOntology:Control
DLTOntology:Cryptography
DLTOntology:CryptographyAttack
DLTOntology:Cybersecurity
DLTOntology:DAPPAttack
DLTOntology:DLTApplicationAttack
DLTOntology:DLTApplicationVulnerability
DLTOntology:DLTComponent
DLTOntology:DLTSystem
DLTOntology:DataProtectionLaw
DLTOntology:DataStorage
DLTOntology:DataStorageAttack
DLTOntology:DataStorageVulnerability
DLTOntology:DataStructure
DLTOntology:DataStructureAttack
DLTOntology:DataStructureVulnerability
DLTOntology:DigitalCurrency
DLTOntology:DigitalIdentity
DLTOntology:DistributedApplication
DLTOntology:DistributedComputing
DLTOntology:DistributedStorage
DLTOntology:Donations
DLTOntology:ECommerce
DLTOntology:EVoting
DLTOntology:Engine
DLTOntology:EngineAttack
DLTOntology:EngineVulnerability
DLTOntology:Entertainment
DLTOntology:FairMarketplace
DLTOntology:FinancialServicesAndTrading
DLTOntology:Gambling
DLTOntology:Gaming
DLTOntology:GovernmentalServices
DLTOntology:HumanRightsAndContributions
DLTOntology:ICTSystemLaw
DLTOntology:IdentityAndAccessControlSystems
DLTOntology:IndicationOfSource
DLTOntology:IndustryInitiative
DLTOntology:IndustryStandard
DLTOntology:InformativeStandard
DLTOntology:Inheritance
DLTOntology:InsuficientVerificationAndValidation
DLTOntology:IntellectualProperty
DLTOntology:InternationalStandardizationOrganization
DLTOntology:IoT
DLTOntology:IoTEcosystem
DLTOntology:LackingPermissionControl
DLTOntology:LandRegister
DLTOntology:Law
DLTOntology:LegalContracts
DLTOntology:MerchantConnection
DLTOntology:Microfinance
DLTOntology:Mitigation
DLTOntology:MusicIndustry
DLTOntology:NGO
DLTOntology:NationalStandardizationOrganization
DLTOntology:NetworkAttack
DLTOntology:NetworkComponent
DLTOntology:NetworkVulnerability
DLTOntology:NormativeStandard
DLTOntology:OrganizationalControl
DLTOntology:OrganizationalMitigation
DLTOntology:Ownership
DLTOntology:P2PLending
DLTOntology:Payments
DLTOntology:PermissionControl
DLTOntology:PowerManagement
DLTOntology:PrivacyAndIdentity
DLTOntology:Protocol
DLTOntology:ProtocolAttack
DLTOntology:ProtocolVulnerability
DLTOntology:PublicTransportation
DLTOntology:RecordKeeping
DLTOntology:RightToInformation
DLTOntology:SecureIoT
DLTOntology:SmartCars
DLTOntology:SmartContract
DLTOntology:SmartContractAttack
DLTOntology:SmartContractVulnerability
DLTOntology:SmartManufacturing
DLTOntology:SmartMeter
DLTOntology:Standard
DLTOntology:StandardizationOrganization
DLTOntology:Streaming
DLTOntology:SupplyChain
DLTOntology:TechnicalControl
DLTOntology:TechnicalMitigation
DLTOntology:Tracking
DLTOntology:Transaction
DLTOntology:Transportation
DLTOntology:Traveling
DLTOntology:UseCase
DLTOntology:UserInterface
DLTOntology:VerificationAndValidation
DLTOntology:VerificationAndValidationAttack
DLTOntology:Voting
DLTOntology:Vulnerability
DLTOntology:Wallet
DLTOntology:WeakCryptography
DLTOntology:dAppVulnerability