{"@context":{"ns0":"https://w3id.org/dpv#","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","skos":"http://www.w3.org/2004/02/skos/core#","owl":"http://www.w3.org/2002/07/owl#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dct":"http://purl.org/dc/terms/","ns1":"http://www.w3.org/2003/06/sw-vocab-status/ns#","metadata_def":"http://data.bioontology.org/metadata/def/"},"@id":"ns0:VulnerabilityTestingMethods","@type":["skos:Concept","ns0:TechnicalMeasure","owl:Class","owl:NamedIndividual"],"rdfs:subClassOf":{"@id":"owl:Thing"},"skos:broader":{"@id":"ns0:SecurityMethod"},"skos:definition":{"@language":"en","@value":"Methods that assess or discover vulnerabilities in a system"},"skos:prefLabel":{"@language":"en","@value":"Vulnerability Testing Methods"},"skos:inScheme":{"@id":"ns0:technical-measures-classes"},"dct:created":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2022-08-17"},"ns1:term_status":{"@language":"en","@value":"accepted"},"dct:contributor":"Harshvardhan J. Pandit","metadata_def:mappingLoom":"vulnerabilitytestingmethods","metadata_def:mappingSameURI":{"@id":"ns0:VulnerabilityTestingMethods"},"rdfs:isDefinedBy":{"@id":"https://w3id.org/dpv#"}}
{"@context":{"ns0":"https://w3id.org/dpv#","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","skos":"http://www.w3.org/2004/02/skos/core#","owl":"http://www.w3.org/2002/07/owl#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dct":"http://purl.org/dc/terms/","ns1":"http://www.w3.org/2003/06/sw-vocab-status/ns#","metadata_def":"http://data.bioontology.org/metadata/def/"},"@id":"ns0:VulnerabilityTestingMethods","@type":["skos:Concept","ns0:TechnicalMeasure","owl:Class","owl:NamedIndividual"],"rdfs:subClassOf":{"@id":"owl:Thing"},"skos:broader":{"@id":"ns0:SecurityMethod"},"skos:definition":{"@language":"en","@value":"Methods that assess or discover vulnerabilities in a system"},"skos:prefLabel":{"@language":"en","@value":"Vulnerability Testing Methods"},"skos:inScheme":{"@id":"ns0:technical-measures-classes"},"dct:created":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2022-08-17"},"ns1:term_status":{"@language":"en","@value":"accepted"},"dct:contributor":"Harshvardhan J. Pandit","metadata_def:mappingLoom":"vulnerabilitytestingmethods","metadata_def:mappingSameURI":{"@id":"ns0:VulnerabilityTestingMethods"},"rdfs:isDefinedBy":{"@id":"https://w3id.org/dpv#"}}