| http://www.w3.org/ns/prov#value | - The ???general feeling??? of the negotiators was that ???there is an attack whenever a person is directly endangered by a mine laid???.37 By analogy, the introduction of malware or production-level defects that are either time-delayed or activate on the occurrence of a particular event is an attack when the intended consequences meet the requisite threshold of harm.
|