http://www.w3.org/ns/prov#value | - Research of particular systems to corruption byin generating adequate metadata and We can define measures of success at malware, and how well they are ableprovenance is required to overcome a high level by answering the follow- to withstand other kinds of malware-these hurdles. ing questions and tracking the answers enabled attacks, such as DDoS attacks. over time: Similarly, metrics that suggest
|