PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Third, leverage your vulnerability scanner, such as Nessus or Qualys, and use its operating system fingerprinting function to find devices that match the unsupported profile, and have it blocked via firewall or the access point.
http://www.w3.org/ns/prov#wasQuotedFrom
  • techweb.com