browser
→
ReceivesAction
→
closed
|
0.79
|
|
browser
→
ReceivesAction
→
set
|
0.71
|
|
browser
→
ReceivesAction
→
used by the user
|
0.64
|
|
browser
→
ReceivesAction
→
updated
|
0.64
|
|
browser
→
ReceivesAction
→
affected
|
0.63
|
|
browser
→
ReceivesAction
→
built
|
0.60
|
|
browser
→
ReceivesAction
→
based on chromium
|
0.59
|
|
browser
→
ReceivesAction
→
set by default
|
0.58
|
|
browser
→
ReceivesAction
→
used by visitor
|
0.58
|
|
browser
→
ReceivesAction
→
configured
|
0.57
|
|
browser
→
ReceivesAction
→
used to access the site
|
0.57
|
|
browser
→
ReceivesAction
→
displayed
|
0.57
|
|
browser
→
ReceivesAction
→
run
|
0.57
|
|
browser
→
ReceivesAction
→
downloaded
|
0.57
|
|
browser
→
ReceivesAction
→
based on chrome
|
0.56
|
|
browser
→
ReceivesAction
→
shown in figure
|
0.56
|
|
browser
→
ReceivesAction
→
identified
|
0.55
|
|
browser
→
ReceivesAction
→
based on webkit
|
0.55
|
|
browser
→
ReceivesAction
→
designed
|
0.55
|
|
browser
→
ReceivesAction
→
concerned
|
0.54
|
|
browser
→
ReceivesAction
→
tested
|
0.53
|
|
browser
→
ReceivesAction
→
used on computer
|
0.52
|
|
browser
→
ReceivesAction
→
based on opera
|
0.51
|
|
browser
→
ReceivesAction
→
easy to use
|
0.51
|
|
browser
→
ReceivesAction
→
installed on other device
|
0.51
|
|
browser
→
ReceivesAction
→
read
|
0.51
|
|
browser
→
ReceivesAction
→
based on the gecko engine
|
0.50
|
|
browser
→
ReceivesAction
→
extended
|
0.50
|
|
browser
→
ReceivesAction
→
updated to the latest version
|
0.50
|
|
browser
→
ReceivesAction
→
installed by default
|
0.49
|
|
browser
→
ReceivesAction
→
hijacked
|
0.49
|
|
browser
→
ReceivesAction
→
installed on firefox
|
0.48
|
|
browser
→
ReceivesAction
→
notified
|
0.47
|
|
browser
→
ReceivesAction
→
set to accept third-party cooki…
|
0.46
|
|
browser
→
ReceivesAction
→
used to browse our website
|
0.46
|
|
browser
→
ReceivesAction
→
configured in such a way
|
0.46
|
|
browser
→
ReceivesAction
→
used on windows
|
0.45
|
|
browser
→
ReceivesAction
→
tested on chrome
|
0.45
|
|
browser
→
ReceivesAction
→
used on ios
|
0.45
|
|
browser
→
ReceivesAction
→
required
|
0.45
|
|
browser
→
ReceivesAction
→
used to access the world wide w…
|
0.44
|
|
browser
→
ReceivesAction
→
broken
|
0.43
|
|
browser
→
ReceivesAction
→
released
|
0.43
|
|
browser
→
ReceivesAction
→
implemented
|
0.42
|
|
browser
→
ReceivesAction
→
based on firefox
|
0.42
|
|
browser
→
ReceivesAction
→
redirected
|
0.42
|
|
browser
→
ReceivesAction
→
resized
|
0.42
|
|
browser
→
ReceivesAction
→
subject to modification
|
0.42
|
|
browser
→
ReceivesAction
→
developed by google
|
0.41
|
|
browser
→
ReceivesAction
→
subject to update
|
0.41
|
|
browser
→
ReceivesAction
→
available in subsequent visits …
|
0.41
|
|
browser
→
ReceivesAction
→
loaded
|
0.41
|
|
browser
→
ReceivesAction
→
compromised
|
0.41
|
|
browser
→
ReceivesAction
→
limited
|
0.41
|
|
browser
→
ReceivesAction
→
restarted
|
0.39
|
|
browser
→
ReceivesAction
→
based
|
0.39
|
|
browser
→
ReceivesAction
→
used to access the page
|
0.39
|
|
browser
→
ReceivesAction
→
tricked
|
0.39
|
|
browser
→
ReceivesAction
→
minimized
|
0.38
|
|
browser
→
ReceivesAction
→
used by guest
|
0.38
|
|
browser
→
ReceivesAction
→
detected
|
0.37
|
|
browser
→
ReceivesAction
→
used to access time
|
0.37
|
|
browser
→
ReceivesAction
→
connected to the internet
|
0.37
|
|
browser
→
ReceivesAction
→
implemented by computing device
|
0.36
|
|
browser
→
ReceivesAction
→
integrated with the os
|
0.36
|
|
browser
→
ReceivesAction
→
provided
|
0.36
|
|
browser
→
ReceivesAction
→
based on internet explorer
|
0.35
|
|
browser
→
ReceivesAction
→
commanded to download new data
|
0.35
|
|
browser
→
ReceivesAction
→
fixed
|
0.35
|
|
browser
→
ReceivesAction
→
installed on the device
|
0.35
|
|
browser
→
ReceivesAction
→
modified
|
0.35
|
|
browser
→
ReceivesAction
→
redirected to url
|
0.35
|
|
browser
→
ReceivesAction
→
shipped with windows
|
0.35
|
|
browser
→
ReceivesAction
→
used as internet explorer
|
0.35
|
|
browser
→
ReceivesAction
→
configured to use a proxy server
|
0.34
|
|
browser
→
ReceivesAction
→
exited
|
0.34
|
|
browser
→
ReceivesAction
→
launched
|
0.34
|
|
browser
→
ReceivesAction
→
blocked
|
0.34
|
|
browser
→
ReceivesAction
→
activated
|
0.33
|
|
browser
→
ReceivesAction
→
added
|
0.32
|
|
browser
→
ReceivesAction
→
aimed at previous opera web bro…
|
0.32
|
|
browser
→
ReceivesAction
→
associated with the client
|
0.32
|
|
browser
→
ReceivesAction
→
configured to use tor
|
0.32
|
|
browser
→
ReceivesAction
→
maximized
|
0.32
|
|
browser
→
ReceivesAction
→
shown in fig
|
0.32
|
|
browser
→
ReceivesAction
→
used by member
|
0.32
|
|
browser
→
ReceivesAction
→
aimed at heavy internet users
|
0.31
|
|
browser
→
ReceivesAction
→
aimed at staunch technologists
|
0.31
|
|
browser
→
ReceivesAction
→
based on the marketing tools
|
0.31
|
|
browser
→
ReceivesAction
→
built into windows
|
0.31
|
|
browser
→
ReceivesAction
→
directed to targeted web site
|
0.31
|
|
browser
→
ReceivesAction
→
installed on the user’s computer
|
0.31
|
|
browser
→
ReceivesAction
→
relaunched
|
0.31
|
|
browser
→
ReceivesAction
→
tracked
|
0.31
|
|
browser
→
ReceivesAction
→
used to navigate on the internet
|
0.31
|
|
browser
→
ReceivesAction
→
unable to recover the web pages
|
0.31
|
|
browser
→
ReceivesAction
→
updated with new features
|
0.31
|
|
browser
→
ReceivesAction
→
disconnected
|
0.30
|
|
browser
→
ReceivesAction
→
discontinued
|
0.30
|
|
browser
→
ReceivesAction
→
infected
|
0.30
|
|
browser
→
ReceivesAction
→
likely to work
|
0.30
|
|
browser
→
ReceivesAction
→
terminated
|
0.30
|
|
browser
→
ReceivesAction
→
used to access date
|
0.30
|
|
browser
→
ReceivesAction
→
known for the internet users
|
0.30
|
|
browser
→
ReceivesAction
→
unable to connect
|
0.29
|
|
browser
→
ReceivesAction
→
about to navigate
|
0.29
|
|
browser
→
ReceivesAction
→
associated with at least one us…
|
0.29
|
|
browser
→
ReceivesAction
→
closed until defined expiration…
|
0.29
|
|
browser
→
ReceivesAction
→
counted
|
0.29
|
|
browser
→
ReceivesAction
→
patched
|
0.29
|
|
browser
→
ReceivesAction
→
reconfigured
|
0.29
|
|
browser
→
ReceivesAction
→
pushed
|
0.27
|
|
browser
→
ReceivesAction
→
used to access the servers of t…
|
0.27
|
|
browser
→
ReceivesAction
→
locked
|
0.27
|
|
browser
→
ReceivesAction
→
redirected to pop-up
|
0.26
|
|
browser
→
ReceivesAction
→
destroyed
|
0.25
|
|
browser
→
ReceivesAction
→
improved
|
0.25
|
|
browser
→
ReceivesAction
→
zoomed
|
0.25
|
|
browser
→
ReceivesAction
→
excluded
|
0.25
|
|
browser
→
ReceivesAction
→
disabled
|
0.24
|
|
browser
→
ReceivesAction
→
selected
|
0.23
|
|
browser
→
ReceivesAction
→
bloated
|
0.23
|
|
browser
→
ReceivesAction
→
enhanced
|
0.21
|
|
browser
→
ReceivesAction
→
manipulated
|
0.21
|
|
browser
→
ReceivesAction
→
unable to track the referrer
|
0.21
|
|
browser
→
ReceivesAction
→
encouraged to use user interfac…
|
0.20
|
|
browser
→
ReceivesAction
→
specified
|
0.17
|
|