| http://www.w3.org/ns/prov#value | - wherein the intrusion analysis module employs the database, including respective information regarding previous respective unauthorized access attempts, to determine whether or not the respective detected possible unauthorized access attempt is authorized.
|