PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Whereas the icon of the Trojan is usually the default icon of the executable files, the hacker maybechange the Trojan???s icon and fake it as a harmless application or even another application such as aMicrosoft Word document or a text file.
http://www.w3.org/ns/prov#wasQuotedFrom
  • slideshare.net