| Similarity | Rank | |
|---|---|---|
| Firewalls | 0.782 | 90626 |
| Detection | 0.776 | 28464 |
| Vulnerability | 0.765 | 55420 |
| Firewall | 0.763 | 37660 |
| Threat | 0.763 | 29468 |
| Endpoint | 0.751 | 90705 |
| intrusion | 0.724 | 19027 |
| Surveillance | 0.715 | 27466 |
| DoS | 0.713 | 77234 |
| firewalls | 0.713 | 31881 |
| IDS | 0.711 | 50360 |
| Malware | 0.709 | 45540 |
| Detector | 0.703 | 57528 |
| Filtering | 0.702 | 52425 |
| Anti-Virus | 0.695 | 79951 |
| Protection | 0.694 | 5297 |
| Detect | 0.689 | 68417 |
| Encryption | 0.687 | 44383 |
| Malicious | 0.682 | 82234 |
| Authentication | 0.681 | 36752 |
| Deployment | 0.680 | 38433 |
| SCADA | 0.679 | 53819 |
| Deploying | 0.679 | 80237 |
| Detectors | 0.677 | 93824 |
| Denial | 0.674 | 38664 |