Toggle navigation
https://w3id.org/DLTOntology#
Entities A-Z
Classes
Properties
Statistics
SPARQL
Classes (115)
DLTOntology:API
DLTOntology:APIAttack
DLTOntology:APIVulnerability
DLTOntology:AccessControlAttack
DLTOntology:ArtificialIntelligence
DLTOntology:Attack
DLTOntology:AuditTrail
DLTOntology:BestPractice
DLTOntology:BusinessProcesses
DLTOntology:BusinessSector
DLTOntology:BusinessTransportation
DLTOntology:ConsensusAlgorithm
DLTOntology:ConsensusAttack
DLTOntology:ConsensusVulnerabiltiy
DLTOntology:ContractualUse
DLTOntology:Control
DLTOntology:Cryptography
DLTOntology:CryptographyAttack
DLTOntology:Cybersecurity
DLTOntology:DAPPAttack
DLTOntology:DLTApplicationAttack
DLTOntology:DLTApplicationVulnerability
DLTOntology:DLTComponent
DLTOntology:DLTSystem
DLTOntology:DataProtectionLaw
DLTOntology:DataStorage
DLTOntology:DataStorageAttack
DLTOntology:DataStorageVulnerability
DLTOntology:DataStructure
DLTOntology:DataStructureAttack
DLTOntology:DataStructureVulnerability
DLTOntology:DigitalCurrency
DLTOntology:DigitalIdentity
DLTOntology:DistributedApplication
DLTOntology:DistributedComputing
DLTOntology:DistributedStorage
DLTOntology:Donations
DLTOntology:ECommerce
DLTOntology:EVoting
DLTOntology:Engine
DLTOntology:EngineAttack
DLTOntology:EngineVulnerability
DLTOntology:Entertainment
DLTOntology:FairMarketplace
DLTOntology:FinancialServicesAndTrading
DLTOntology:Gambling
DLTOntology:Gaming
DLTOntology:GovernmentalServices
DLTOntology:HumanRightsAndContributions
DLTOntology:ICTSystemLaw
DLTOntology:IdentityAndAccessControlSystems
DLTOntology:IndicationOfSource
DLTOntology:IndustryInitiative
DLTOntology:IndustryStandard
DLTOntology:InformativeStandard
DLTOntology:Inheritance
DLTOntology:InsuficientVerificationAndValidation
DLTOntology:IntellectualProperty
DLTOntology:InternationalStandardizationOrganization
DLTOntology:IoT
DLTOntology:IoTEcosystem
DLTOntology:LackingPermissionControl
DLTOntology:LandRegister
DLTOntology:Law
DLTOntology:LegalContracts
DLTOntology:MerchantConnection
DLTOntology:Microfinance
DLTOntology:Mitigation
DLTOntology:MusicIndustry
DLTOntology:NGO
DLTOntology:NationalStandardizationOrganization
DLTOntology:NetworkAttack
DLTOntology:NetworkComponent
DLTOntology:NetworkVulnerability
DLTOntology:NormativeStandard
DLTOntology:OrganizationalControl
DLTOntology:OrganizationalMitigation
DLTOntology:Ownership
DLTOntology:P2PLending
DLTOntology:Payments
DLTOntology:PermissionControl
DLTOntology:PowerManagement
DLTOntology:PrivacyAndIdentity
DLTOntology:Protocol
DLTOntology:ProtocolAttack
DLTOntology:ProtocolVulnerability
DLTOntology:PublicTransportation
DLTOntology:RecordKeeping
DLTOntology:RightToInformation
DLTOntology:SecureIoT
DLTOntology:SmartCars
DLTOntology:SmartContract
DLTOntology:SmartContractAttack
DLTOntology:SmartContractVulnerability
DLTOntology:SmartManufacturing
DLTOntology:SmartMeter
DLTOntology:Standard
DLTOntology:StandardizationOrganization
DLTOntology:Streaming
DLTOntology:SupplyChain
DLTOntology:TechnicalControl
DLTOntology:TechnicalMitigation
DLTOntology:Tracking
DLTOntology:Transaction
DLTOntology:Transportation
DLTOntology:Traveling
DLTOntology:UseCase
DLTOntology:UserInterface
DLTOntology:VerificationAndValidation
DLTOntology:VerificationAndValidationAttack
DLTOntology:Voting
DLTOntology:Vulnerability
DLTOntology:Wallet
DLTOntology:WeakCryptography
DLTOntology:dAppVulnerability
Properties (15)
DLTOntology:canExploit
DLTOntology:comesFrom
DLTOntology:controls
DLTOntology:createsStandard
DLTOntology:hasBusinessSector
DLTOntology:hasComponent
DLTOntology:hasUseCase
DLTOntology:hasVulnerability
DLTOntology:isCompliantTo
DLTOntology:isRegulatedBy
DLTOntology:isSpecializedFor
DLTOntology:isUsedFor
DLTOntology:mitigates
DLTOntology:threatens
dc:description
Home
Entities
Classes
Classes Tree
Tree
DLTOntology:Attack
DLTOntology:APIAttack
DLTOntology:AccessControlAttack
DLTOntology:ConsensusAttack
DLTOntology:CryptographyAttack
DLTOntology:DAPPAttack
DLTOntology:DLTApplicationAttack
DLTOntology:DataStorageAttack
DLTOntology:DataStructureAttack
DLTOntology:EngineAttack
DLTOntology:NetworkAttack
DLTOntology:ProtocolAttack
DLTOntology:SmartContractAttack
DLTOntology:VerificationAndValidationAttack
DLTOntology:BusinessSector
DLTOntology:Control
DLTOntology:OrganizationalControl
DLTOntology:TechnicalControl
DLTOntology:DLTComponent
DLTOntology:API
DLTOntology:ConsensusAlgorithm
DLTOntology:Cryptography
DLTOntology:DataStorage
DLTOntology:DataStructure
DLTOntology:DistributedApplication
DLTOntology:Engine
DLTOntology:NetworkComponent
DLTOntology:PermissionControl
DLTOntology:Protocol
DLTOntology:SmartContract
DLTOntology:Transaction
DLTOntology:UserInterface
DLTOntology:VerificationAndValidation
DLTOntology:Wallet
DLTOntology:DLTSystem
DLTOntology:Law
DLTOntology:DataProtectionLaw
DLTOntology:ICTSystemLaw
DLTOntology:Mitigation
DLTOntology:OrganizationalMitigation
DLTOntology:TechnicalMitigation
DLTOntology:Standard
DLTOntology:BestPractice
DLTOntology:IndustryStandard
DLTOntology:InformativeStandard
DLTOntology:NormativeStandard
DLTOntology:StandardizationOrganization
DLTOntology:IndustryInitiative
...TOntology:InternationalStandardizationOrganization
DLTOntology:NationalStandardizationOrganization
DLTOntology:UseCase
DLTOntology:ArtificialIntelligence
DLTOntology:ContractualUse
DLTOntology:BusinessProcesses
DLTOntology:Inheritance
DLTOntology:LegalContracts
DLTOntology:Cybersecurity
DLTOntology:DigitalCurrency
DLTOntology:Microfinance
DLTOntology:P2PLending
DLTOntology:Payments
DLTOntology:DistributedComputing
DLTOntology:DistributedStorage
DLTOntology:ECommerce
DLTOntology:FairMarketplace
DLTOntology:MerchantConnection
DLTOntology:Entertainment
DLTOntology:Gambling
DLTOntology:Gaming
DLTOntology:MusicIndustry
DLTOntology:Streaming
DLTOntology:FinancialServicesAndTrading
DLTOntology:GovernmentalServices
DLTOntology:EVoting
DLTOntology:HumanRightsAndContributions
DLTOntology:Donations
DLTOntology:NGO
DLTOntology:RightToInformation
DLTOntology:IoT
DLTOntology:IoTEcosystem
DLTOntology:SecureIoT
DLTOntology:PowerManagement
DLTOntology:SmartMeter
DLTOntology:PrivacyAndIdentity
DLTOntology:DigitalIdentity
DLTOntology:IdentityAndAccessControlSystems
DLTOntology:RecordKeeping
DLTOntology:AuditTrail
DLTOntology:IntellectualProperty
DLTOntology:LandRegister
DLTOntology:Ownership
DLTOntology:Voting
DLTOntology:SmartManufacturing
DLTOntology:SupplyChain
DLTOntology:IndicationOfSource
DLTOntology:Tracking
DLTOntology:Transportation
DLTOntology:BusinessTransportation
DLTOntology:PublicTransportation
DLTOntology:SmartCars
DLTOntology:Traveling
DLTOntology:Vulnerability
DLTOntology:APIVulnerability
DLTOntology:ConsensusVulnerabiltiy
DLTOntology:DLTApplicationVulnerability
DLTOntology:DataStorageVulnerability
DLTOntology:DataStructureVulnerability
DLTOntology:EngineVulnerability
DLTOntology:InsuficientVerificationAndValidation
DLTOntology:LackingPermissionControl
DLTOntology:NetworkVulnerability
DLTOntology:ProtocolVulnerability
DLTOntology:SmartContractVulnerability
DLTOntology:WeakCryptography
DLTOntology:dAppVulnerability