http://www.w3.org/ns/prov#value | - Since these critical infrastructure systems increasingly employ desktop operating systems and hardware rather than proprietary, industry-specific ones (which, again, is a design decision made with convenience and cost in mind), once the attacker knows the vulnerability is there, he can rely on well-known techniques for exploiting it.
|