Exploits availability entry ontology

Revision:
1.1
Authors:
https://www.en.nask.pl
Download serialization:
JSON-LD RDF/XML N-Triples TTL
License:
http://creativecommons.org/licenses/by-sa/4.0/
Visualization:
Visualize with WebVowl
Cite as:
https://www.en.nask.pl. Exploits availability entry ontology. Revision: 1.1.
Ontology Specification Draft

Abstract

Links to the external resources with code exploiting the vulnerability

Exploits availability entry ontology: Overview back to ToC

This ontology has the following classes and properties.

Classes

Object Properties

Data Properties

Annotation Properties

Exploits availability entry ontology: Description back to ToC

This is a placeholder text for the description of your ontology. The description should include an explanation and a diagram explaining how the classes are related, examples of usage, etc.

Cross-reference for Exploits availability entry ontology classes, object properties and data properties back to ToC

This section provides details for each class and property defined by Exploits availability entry ontology.

Classes

sourcesc back to ToC or Class ToC

IRI: https://www.variotdbs.pl/ref/sources

Sources of the information (entries from external databases)
is in domain of
db dp, id dp
is in range of
has sources op

Object Properties

has sourcesop back to ToC or Object Property ToC

IRI: https://www.variotdbs.pl/ref/exploit_availability#has_sources

has range
sources c

Data Properties

dbdp back to ToC or Data Property ToC

IRI: https://www.variotdbs.pl/ref/sources#db

Name of the source database
has domain
sources c
has range
string

iddp back to ToC or Data Property ToC

IRI: https://www.variotdbs.pl/ref/sources#id

Identifier in the source database
has domain
sources c
has range
string

referencedp back to ToC or Data Property ToC

IRI: https://www.variotdbs.pl/ref/exploit_availability#reference

A URL to the external resource with a code of the exploit
has domain
exploit availability c
has range
any u r i

trustdp back to ToC or Data Property ToC

IRI: https://www.variotdbs.pl/ref/exploit_availability#trust

How much the information about the exploit reference can be trusted
has domain
exploit availability c
has range

typedp back to ToC or Data Property ToC

IRI: https://www.variotdbs.pl/ref/exploit_availability#type

Type of the exploit e.g. Proof-of-Concept or working exploit
has domain
exploit availability c
has range
string

Annotation Properties

creatorap back to ToC or Annotation Property ToC

IRI: http://purl.org/dc/elements/1.1/creator

descriptionap back to ToC or Annotation Property ToC

IRI: http://purl.org/dc/elements/1.1/description

rightsap back to ToC or Annotation Property ToC

IRI: http://purl.org/dc/elements/1.1/rights

titleap back to ToC or Annotation Property ToC

IRI: http://purl.org/dc/elements/1.1/title

Legend back to ToC

c: Classes
op: Object Properties
dp: Data Properties

References back to ToC

Add your references here. It is recommended to have them as a list.

Acknowledgments back to ToC

The authors would like to thank Silvio Peroni for developing LODE, a Live OWL Documentation Environment, which is used for representing the Cross Referencing Section of this document and Daniel Garijo for developing Widoco, the program used to create the template used in this documentation.