| http://www.w3.org/ns/prov#value | - The attack data is collected by 97 sensors known as honeypot systems deployed by the company around the world.These sensors serve as decoys for automated attacks targeting vulnerabilities in network services, websites, smartphones and other types of systems.
|