| Similarity | Rank | |
|---|---|---|
| vulnerability | 0.857 | 11458 |
| malware | 0.764 | 12409 |
| XSS | 0.739 | 84911 |
| security-related | 0.739 | 98904 |
| Vulnerability | 0.737 | 55420 |
| exploitable | 0.712 | 82633 |
| hackers | 0.705 | 14353 |
| weaknesses | 0.705 | 9301 |
| cybercriminals | 0.700 | 84265 |
| botnets | 0.700 | 88730 |
| threats | 0.695 | 5164 |
| firewalls | 0.695 | 31881 |
| DoS | 0.685 | 77234 |
| rootkit | 0.680 | 93800 |
| Malware | 0.678 | 45540 |
| flaws | 0.676 | 10007 |
| Stuxnet | 0.673 | 72126 |
| anti-malware | 0.673 | 66453 |
| workarounds | 0.666 | 61744 |
| incompatibilities | 0.665 | 89450 |
| spyware | 0.663 | 19384 |
| Exploit | 0.661 | 80399 |
| Symantec | 0.657 | 37712 |
| DDoS | 0.654 | 47204 |
| shortcomings | 0.651 | 16278 |