| http://www.w3.org/ns/prov#value | - For example, in Detect 4 of the GCIA practical done by Graham Stork, he states the following: The attack is a stimulus of some kind, it is not a scan as scans are not effective when reserved addresses are used, because the information gained by the scan is not returned to the attacker.
|