| Similarity | Rank | |
|---|---|---|
| loophole | 0.673 | 29435 |
| sneaky | 0.649 | 25396 |
| firewall | 0.635 | 14677 |
| snooping | 0.626 | 48916 |
| rogue | 0.616 | 15920 |
| loopholes | 0.616 | 25674 |
| malicious | 0.597 | 12572 |
| surreptitiously | 0.595 | 50473 |
| snoop | 0.595 | 66547 |
| rootkit | 0.593 | 93800 |
| surreptitious | 0.590 | 79711 |
| trojan | 0.588 | 43971 |
| trojans | 0.585 | 71682 |
| circumvented | 0.570 | 68625 |
| malware | 0.568 | 12409 |
| spying | 0.567 | 20954 |
| ruse | 0.567 | 41008 |
| spoofing | 0.565 | 68521 |
| hackers | 0.564 | 14353 |
| nasty | 0.563 | 6686 |
| eavesdropping | 0.563 | 47050 |
| Trojan | 0.562 | 20080 |
| spyware | 0.561 | 19384 |
| firewalls | 0.560 | 31881 |
| circumventing | 0.560 | 68025 |