backdoor
→
ReceivesAction
→
created
|
0.66
|
|
backdoor
→
ReceivesAction
→
discovered
|
0.64
|
|
backdoor
→
ReceivesAction
→
installed
|
0.61
|
|
backdoor
→
ReceivesAction
→
exploited
|
0.57
|
|
backdoor
→
ReceivesAction
→
put in place
|
0.51
|
|
backdoor
→
ReceivesAction
→
installed by attacker
|
0.46
|
|
backdoor
→
ReceivesAction
→
removed
|
0.43
|
|
backdoor
→
ReceivesAction
→
exploited by criminal
|
0.42
|
|
backdoor
→
ReceivesAction
→
inserted
|
0.40
|
|
backdoor
→
ReceivesAction
→
written in delphi
|
0.38
|
|
backdoor
→
ReceivesAction
→
difficult to detect
|
0.38
|
|
backdoor
→
ReceivesAction
→
activated
|
0.34
|
|
backdoor
→
ReceivesAction
→
fixed
|
0.34
|
|
backdoor
→
ReceivesAction
→
provided by apple
|
0.25
|
|
backdoor
→
ReceivesAction
→
provided by nokia
|
0.25
|
|
backdoor
→
ReceivesAction
→
provided by rim
|
0.25
|
|
backdoor
→
ReceivesAction
→
created for law enforcement
|
0.22
|
|
backdoor
→
ReceivesAction
→
created for intelligence survei…
|
0.16
|
|