<http://webisa.webdatacommons.org/prov/491889747> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/29005462> . <http://webisa.webdatacommons.org/prov/378151706> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/29005462> . <http://webisa.webdatacommons.org/29005462> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://www.w3.org/ns/prov#Entity> . <http://webisa.webdatacommons.org/prov/202928159> <http://www.w3.org/ns/prov#wasDerivedFrom> <http://webisa.webdatacommons.org/29005462> . <http://webisa.webdatacommons.org/29005462> <http://www.w3.org/ns/prov#value> "Test Methodology The research team focused on vulnerabilities in a number of widely-used applications and tools, among them Microsoft Office, Internet Explorer, Flash, and Java." . <http://webisa.webdatacommons.org/29005462> <http://www.w3.org/ns/prov#wasQuotedFrom> <pcmag.com> .