PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Setting up a machine in this manner permits the machine to monitor the activities of the entire network and scan for disallowed network activities without being easily detected by an intruder. [0033] The fifth method of deception used in this system is a moving target, provided by what is called a ???mobile machine??? deception unit.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com