| Similarity | Rank | |
|---|---|---|
| security_requirement | 0.629 | 74008 |
| foreign_policy | 0.619 | 8373 |
| security_issue | 0.616 | 19872 |
| security_measure | 0.616 | 29180 |
| policy | 0.614 | 288 |
| information_security | 0.610 | 25742 |
| security | 0.608 | 651 |
| international_security | 0.607 | 52055 |
| cyber_security | 0.601 | 29800 |
| internal_security | 0.601 | 85993 |
| security_threat | 0.601 | 47415 |
| security_concern | 0.586 | 37021 |
| global_security | 0.585 | 68977 |
| network_security | 0.582 | 45208 |
| security_challenge | 0.582 | 64605 |
| data_security | 0.578 | 71029 |
| security_solution | 0.568 | 69852 |
| physical_security | 0.568 | 75208 |
| counter-terrorism | 0.567 | 55418 |
| Security | 0.562 | 4228 |
| datum_protection | 0.561 | 53904 |
| migration_policy | 0.560 | 88781 |
| data_protection | 0.560 | 42270 |
| security_risk | 0.558 | 53682 |
| regional_security | 0.558 | 76666 |