PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Using a tool such as Wireshark you can filter all communications for the IP address of the suspect machine, and then view, in real time, or by log analysis, what sort of communication is occuring at any given time.
http://www.w3.org/ns/prov#wasQuotedFrom
  • superuser.com