<http://webisa.webdatacommons.org/prov/491889747>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/29005462> .
<http://webisa.webdatacommons.org/prov/378151706>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/29005462> .
<http://webisa.webdatacommons.org/29005462>	<http://www.w3.org/1999/02/22-rdf-syntax-ns#type>	<http://www.w3.org/ns/prov#Entity> .
<http://webisa.webdatacommons.org/prov/202928159>	<http://www.w3.org/ns/prov#wasDerivedFrom>	<http://webisa.webdatacommons.org/29005462> .
<http://webisa.webdatacommons.org/29005462>	<http://www.w3.org/ns/prov#value>	"Test Methodology The research team focused on vulnerabilities in a number of widely-used applications and tools, among them Microsoft Office, Internet Explorer, Flash, and Java." .
<http://webisa.webdatacommons.org/29005462>	<http://www.w3.org/ns/prov#wasQuotedFrom>	<pcmag.com> .