PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • However, backtracking the attacker generally requires locating the origin of the malicious packet first; then other techniques, such as forensic analysis of the originating machine, can be employed to attempt to follow the trail back to the true origin of the attack.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com