Similarity | Rank | |
---|---|---|
vulnerability | 0.857 | 11458 |
malware | 0.764 | 12409 |
XSS | 0.739 | 84911 |
security-related | 0.739 | 98904 |
Vulnerability | 0.737 | 55420 |
exploitable | 0.712 | 82633 |
hackers | 0.705 | 14353 |
weaknesses | 0.705 | 9301 |
cybercriminals | 0.700 | 84265 |
botnets | 0.700 | 88730 |
threats | 0.695 | 5164 |
firewalls | 0.695 | 31881 |
DoS | 0.685 | 77234 |
rootkit | 0.680 | 93800 |
Malware | 0.678 | 45540 |
flaws | 0.676 | 10007 |
Stuxnet | 0.673 | 72126 |
anti-malware | 0.673 | 66453 |
workarounds | 0.666 | 61744 |
incompatibilities | 0.665 | 89450 |
spyware | 0.663 | 19384 |
Exploit | 0.661 | 80399 |
Symantec | 0.657 | 37712 |
DDoS | 0.654 | 47204 |
shortcomings | 0.651 | 16278 |