PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • At the same time, exploitation of infrastructure vulnerabilities for criminal, terrorist, or foreign adversary purposes is a threat that potentially has no boundaries.
http://www.w3.org/ns/prov#wasQuotedFrom
  • ebooks.com