| Similarity | Rank | |
|---|---|---|
| encryption | 0.741 | 12672 |
| computer_security | 0.739 | 68036 |
| network_security | 0.683 | 45208 |
| decryption | 0.650 | 93105 |
| information_security | 0.644 | 25742 |
| crypto | 0.640 | 98293 |
| Internet_security | 0.613 | 86537 |
| information_theory | 0.606 | 80241 |
| cipher | 0.603 | 44738 |
| digital_signature | 0.592 | 63775 |
| computer_science | 0.583 | 8952 |
| cyber_security | 0.581 | 29800 |
| software_engineering | 0.579 | 32198 |
| encrypt | 0.579 | 14327 |
| data_security | 0.570 | 71029 |
| cybersecurity | 0.566 | 29050 |
| distribute_computing | 0.565 | 86914 |
| datum_security | 0.565 | 83145 |
| Algorithms | 0.562 | 48835 |
| reverse_engineering | 0.560 | 67826 |
| computing | 0.553 | 8540 |
| Information_Security | 0.549 | 41846 |
| distribute_system | 0.548 | 46515 |
| biometrics | 0.548 | 41949 |
| machine_learning | 0.544 | 25874 |