| http://www.w3.org/ns/prov#value | - The system of claim 21, wherein the first and second intrusion detection systems in cooperation with the intrusion analysis system employ a policy file to regulate the screening and removing of the sensitive information, including removing all content or core information, removing content having certain words, and removing content originating from a predetermined location.
|