PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • In addition to leveraging the printer for a downstream attack, an attacker could change how the printer is configured or access device and network information, device credentials and other information passed to the printer, CERT said.
http://www.w3.org/ns/prov#wasQuotedFrom
  • threatpost.com