adversary
→
CapableOf
→
capture the device
|
0.53
|
|
adversary
→
CapableOf
→
launch attack
|
0.40
|
|
adversary
→
CapableOf
→
take advantage
|
0.37
|
|
adversary
→
CapableOf
→
prowl like roaring lion
|
0.36
|
|
adversary
→
CapableOf
→
find some message
|
0.34
|
|
adversary
→
CapableOf
→
walk like roaring lion
|
0.34
|
|
adversary
→
CapableOf
→
thrust the 4th
|
0.32
|
|
adversary
→
CapableOf
→
battle mysterious mist
|
0.25
|
|
adversary
→
CapableOf
→
compromise node
|
0.25
|
|
adversary
→
CapableOf
→
feels obliged to respond with c…
|
0.25
|
|
adversary
→
CapableOf
→
find corresponding digital sign…
|
0.25
|
|
adversary
→
CapableOf
→
forge aggregated results
|
0.25
|
|
adversary
→
CapableOf
→
gain foothold
|
0.25
|
|
adversary
→
CapableOf
→
maintain morality
|
0.25
|
|
adversary
→
CapableOf
→
maintain sanity
|
0.25
|
|
adversary
→
CapableOf
→
operate in full spectrum of com…
|
0.25
|
|
adversary
→
CapableOf
→
penetrate the network
|
0.25
|
|
adversary
→
CapableOf
→
run unprivileged code
|
0.25
|
|
adversary
→
CapableOf
→
snoop on message
|
0.25
|
|
adversary
→
CapableOf
→
use tactic
|
0.25
|
|
adversary
→
CapableOf
→
change over time
|
0.23
|
|
adversary
→
CapableOf
→
exploit vulnerability
|
0.23
|
|
adversary
→
CapableOf
→
seize the opportunity
|
0.23
|
|
adversary
→
CapableOf
→
attack the system
|
0.20
|
|
adversary
→
CapableOf
→
impersonate the user
|
0.20
|
|
adversary
→
CapableOf
→
seek to devour someone
|
0.20
|
|
adversary
→
CapableOf
→
act in bad faith
|
0.16
|
|
adversary
→
CapableOf
→
exploit all the necessary tools
|
0.16
|
|
adversary
→
CapableOf
→
gain unfair advantage
|
0.16
|
|
adversary
→
CapableOf
→
spread misinformation
|
0.16
|
|
adversary
→
CapableOf
→
use information operations
|
0.16
|
|
adversary
→
CapableOf
→
viewed different establishments
|
0.16
|
|