PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • The same techniques have been used by government-sponsored cyberspook attacks against military contractors, IT firms such as Google and Apple, human right activists, smart-grid tech providers, governments and the rest.Kaspersky researchers first came across Winnti malicious activities in the autumn of 2011, when a malicious Trojan was detected on a large number of end-user computers worldwide.
http://www.w3.org/ns/prov#wasQuotedFrom
  • theregister.co.uk