| Similarity | Rank | |
|---|---|---|
| vulnerability | 0.773 | 11458 |
| Threat | 0.768 | 29468 |
| Intrusion | 0.765 | 81488 |
| Exploit | 0.758 | 80399 |
| Resilience | 0.756 | 46596 |
| Threats | 0.754 | 39696 |
| vulnerabilities | 0.737 | 18881 |
| Persistent | 0.722 | 42552 |
| Deployment | 0.718 | 38433 |
| Severity | 0.717 | 78113 |
| Endpoint | 0.715 | 90705 |
| Risk | 0.707 | 7952 |
| Indicators | 0.705 | 34564 |
| Detection | 0.705 | 28464 |
| Mitigation | 0.704 | 46446 |
| Monitoring | 0.698 | 13582 |
| Vulnerable | 0.698 | 53506 |
| Profiling | 0.695 | 68268 |
| Insecurity | 0.695 | 85223 |
| Validation | 0.692 | 37745 |
| Reporting | 0.683 | 13072 |
| Mapping | 0.681 | 25706 |
| Data | 0.681 | 3414 |
| Capabilities | 0.679 | 44919 |
| Identity | 0.679 | 15180 |