| http://www.w3.org/ns/prov#value | - Making effective use of such a system can be challenging, especially in the early phases of benchmarking normal traffic; like intrusion detection systems and data-leak prevention systems, network behavioral analysis tools can be prone to throwing false positives" -- alerts calling attention to what is really innocuous behavior.
|