http://www.w3.org/ns/prov#value | - DoD is particularly concerned with three areasof potential adversarial activity: theft or exploitation of data; disruption or denial of access orservice that affects the availability of networks, information, or network-enabled resources; anddestructive action including corruption, manipulation, or direct activity that threatens to destroyor degrade networks or connected systems.
|