PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • As described in more detail below, the first software application counters the attack by ensuring that the three-way handshake is actually completed (i.e., the connection is a valid one) before sending a SYN packet to the desired destination of a connection. [0016] The first Checkpoint application operates as follows.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com