| Similarity | Rank | |
|---|---|---|
| network_security | 0.822 | 45208 |
| information_security | 0.803 | 25742 |
| Internet_security | 0.760 | 86537 |
| cyber_security | 0.751 | 29800 |
| cryptography | 0.739 | 39105 |
| cybersecurity | 0.728 | 29050 |
| software_engineering | 0.680 | 32198 |
| Information_Security | 0.658 | 41846 |
| data_security | 0.657 | 71029 |
| computer_network | 0.656 | 29982 |
| phishing | 0.631 | 76508 |
| datum_security | 0.625 | 83145 |
| cybercrime | 0.621 | 58930 |
| Cyber_Security | 0.615 | 59396 |
| security_expert | 0.614 | 64965 |
| malware | 0.613 | 12397 |
| Cybersecurity | 0.610 | 62294 |
| software_design | 0.608 | 51028 |
| computer_science | 0.608 | 8952 |
| hacker | 0.607 | 8452 |
| system_administration | 0.599 | 85282 |
| encryption | 0.599 | 12672 |
| distribute_system | 0.587 | 46515 |
| cyber_crime | 0.587 | 97451 |
| cloud_computing | 0.584 | 12561 |