computer system
→
ReceivesAction
→
affected by other threats
|
0.59
|
|
computer system
→
ReceivesAction
→
connected
|
0.54
|
|
computer system
→
ReceivesAction
→
known in the art
|
0.52
|
|
computer system
→
ReceivesAction
→
shown in fig
|
0.51
|
|
computer system
→
ReceivesAction
→
validated
|
0.51
|
|
computer system
→
ReceivesAction
→
designed
|
0.51
|
|
computer system
→
ReceivesAction
→
updated
|
0.50
|
|
computer system
→
ReceivesAction
→
interconnected
|
0.49
|
|
computer system
→
ReceivesAction
→
bought
|
0.49
|
|
computer system
→
ReceivesAction
→
rebooted
|
0.49
|
|
computer system
→
ReceivesAction
→
networked
|
0.48
|
|
computer system
→
ReceivesAction
→
shown in above figures
|
0.48
|
|
computer system
→
ReceivesAction
→
connected by lan
|
0.48
|
|
computer system
→
ReceivesAction
→
claimed in claim
|
0.47
|
|
computer system
→
ReceivesAction
→
performed
|
0.46
|
|
computer system
→
ReceivesAction
→
connected to printer
|
0.46
|
|
computer system
→
ReceivesAction
→
illustrated in fig
|
0.45
|
|
computer system
→
ReceivesAction
→
identified
|
0.44
|
|
computer system
→
ReceivesAction
→
limited
|
0.44
|
|
computer system
→
ReceivesAction
→
configured
|
0.44
|
|
computer system
→
ReceivesAction
→
hacked
|
0.44
|
|
computer system
→
ReceivesAction
→
connected to network
|
0.43
|
|
computer system
→
ReceivesAction
→
coupled via the bus
|
0.43
|
|
computer system
→
ReceivesAction
→
protected against intrusion
|
0.43
|
|
computer system
→
ReceivesAction
→
linked
|
0.42
|
|
computer system
→
ReceivesAction
→
owned
|
0.42
|
|
computer system
→
ReceivesAction
→
provided
|
0.42
|
|
computer system
→
ReceivesAction
→
implemented
|
0.41
|
|
computer system
→
ReceivesAction
→
used in tracking
|
0.41
|
|
computer system
→
ReceivesAction
→
employed
|
0.41
|
|
computer system
→
ReceivesAction
→
incorporated into personal comp…
|
0.41
|
|
computer system
→
ReceivesAction
→
described in claim
|
0.40
|
|
computer system
→
ReceivesAction
→
shown comprising hardware eleme…
|
0.40
|
|
computer system
→
ReceivesAction
→
obtained
|
0.40
|
|
computer system
→
ReceivesAction
→
constructed in accordance
|
0.40
|
|
computer system
→
ReceivesAction
→
coupled to network
|
0.39
|
|
computer system
→
ReceivesAction
→
described
|
0.39
|
|
computer system
→
ReceivesAction
→
used in conjunction
|
0.39
|
|
computer system
→
ReceivesAction
→
programmed
|
0.38
|
|
computer system
→
ReceivesAction
→
coupled through the internet
|
0.38
|
|
computer system
→
ReceivesAction
→
disclosed
|
0.38
|
|
computer system
→
ReceivesAction
→
described in relation
|
0.38
|
|
computer system
→
ReceivesAction
→
coupled to a communications net…
|
0.37
|
|
computer system
→
ReceivesAction
→
illustrated
|
0.37
|
|
computer system
→
ReceivesAction
→
described with reference
|
0.36
|
|
computer system
→
ReceivesAction
→
incorporated into a tablet pc
|
0.36
|
|
computer system
→
ReceivesAction
→
incorporated into mobile device
|
0.36
|
|
computer system
→
ReceivesAction
→
bought on big-scale
|
0.36
|
|
computer system
→
ReceivesAction
→
implemented in particular embod…
|
0.36
|
|
computer system
→
ReceivesAction
→
used to implement method
|
0.36
|
|
computer system
→
ReceivesAction
→
connected to other computer sys…
|
0.35
|
|
computer system
→
ReceivesAction
→
turned off power
|
0.35
|
|
computer system
→
ReceivesAction
→
configured by software
|
0.35
|
|
computer system
→
ReceivesAction
→
connected to the service
|
0.35
|
|
computer system
→
ReceivesAction
→
booted
|
0.35
|
|
computer system
→
ReceivesAction
→
connected to each other
|
0.35
|
|
computer system
→
ReceivesAction
→
controlled by operating system …
|
0.35
|
|
computer system
→
ReceivesAction
→
installed
|
0.35
|
|
computer system
→
ReceivesAction
→
used by the person
|
0.35
|
|
computer system
→
ReceivesAction
→
used in a wan networking enviro…
|
0.35
|
|
computer system
→
ReceivesAction
→
connected by 24 hour
|
0.34
|
|
computer system
→
ReceivesAction
→
accessed through network
|
0.34
|
|
computer system
→
ReceivesAction
→
incorporated into other machine
|
0.34
|
|
computer system
→
ReceivesAction
→
incorporated into personal digi…
|
0.34
|
|
computer system
→
ReceivesAction
→
upgraded
|
0.34
|
|
computer system
→
ReceivesAction
→
assigned by the internet servic…
|
0.33
|
|
computer system
→
ReceivesAction
→
configured to access including …
|
0.33
|
|
computer system
→
ReceivesAction
→
developed
|
0.33
|
|
computer system
→
ReceivesAction
→
incorporated into a communicati…
|
0.33
|
|
computer system
→
ReceivesAction
→
incorporated into a web applian…
|
0.33
|
|
computer system
→
ReceivesAction
→
incorporated into palmtop compu…
|
0.33
|
|
computer system
→
ReceivesAction
→
modified in accordance
|
0.33
|
|
computer system
→
ReceivesAction
→
programmed to provide graphical…
|
0.33
|
|
computer system
→
ReceivesAction
→
configured with executable inst…
|
0.33
|
|
computer system
→
ReceivesAction
→
connected to other devices
|
0.33
|
|
computer system
→
ReceivesAction
→
embodied in wireless device
|
0.33
|
|
computer system
→
ReceivesAction
→
implemented in software or hard…
|
0.33
|
|
computer system
→
ReceivesAction
→
incorporated into camera
|
0.33
|
|
computer system
→
ReceivesAction
→
used by the data subject
|
0.33
|
|
computer system
→
ReceivesAction
→
affected by desktop
|
0.32
|
|
computer system
→
ReceivesAction
→
affected by laptop
|
0.32
|
|
computer system
→
ReceivesAction
→
affected by mobile devices
|
0.32
|
|
computer system
→
ReceivesAction
→
backed up by a best-in-the-indu…
|
0.32
|
|
computer system
→
ReceivesAction
→
backed up by personalized custo…
|
0.32
|
|
computer system
→
ReceivesAction
→
manufactured by avadirect
|
0.32
|
|
computer system
→
ReceivesAction
→
acquired on big-scale
|
0.32
|
|
computer system
→
ReceivesAction
→
coupled by communication link
|
0.32
|
|
computer system
→
ReceivesAction
→
described in greater detail
|
0.32
|
|
computer system
→
ReceivesAction
→
incorporated into a control sys…
|
0.32
|
|
computer system
→
ReceivesAction
→
powered
|
0.32
|
|
computer system
→
ReceivesAction
→
shown in communication
|
0.32
|
|
computer system
→
ReceivesAction
→
equipped
|
0.31
|
|
computer system
→
ReceivesAction
→
on special
|
0.31
|
|
computer system
→
ReceivesAction
→
connected to the communications…
|
0.31
|
|
computer system
→
ReceivesAction
→
embodied in gateway
|
0.31
|
|
computer system
→
ReceivesAction
→
incorporated into wireless tele…
|
0.31
|
|
computer system
→
ReceivesAction
→
programmable
|
0.31
|
|
computer system
→
ReceivesAction
→
responsible for coordination
|
0.31
|
|
computer system
→
ReceivesAction
→
shown to contain single system …
|
0.31
|
|
computer system
→
ReceivesAction
→
shown with one cpu
|
0.31
|
|
computer system
→
ReceivesAction
→
affected by files virus
|
0.31
|
|
computer system
→
ReceivesAction
→
configured to provide service
|
0.30
|
|
computer system
→
ReceivesAction
→
manufactured
|
0.30
|
|
computer system
→
ReceivesAction
→
programmed to perform the metho…
|
0.30
|
|
computer system
→
ReceivesAction
→
affected
|
0.30
|
|
computer system
→
ReceivesAction
→
based on method
|
0.29
|
|
computer system
→
ReceivesAction
→
configured in accordance
|
0.29
|
|
computer system
→
ReceivesAction
→
connected to the website
|
0.29
|
|
computer system
→
ReceivesAction
→
designed to block unauthorized …
|
0.29
|
|
computer system
→
ReceivesAction
→
embodied in server
|
0.29
|
|
computer system
→
ReceivesAction
→
evolved into sophisticated devi…
|
0.29
|
|
computer system
→
ReceivesAction
→
go to be protected against virus
|
0.29
|
|
computer system
→
ReceivesAction
→
illustrated as 14
|
0.29
|
|
computer system
→
ReceivesAction
→
illustrated as 20
|
0.29
|
|
computer system
→
ReceivesAction
→
illustrated as workstation
|
0.29
|
|
computer system
→
ReceivesAction
→
incorporated into a set-top box
|
0.29
|
|
computer system
→
ReceivesAction
→
incorporated into personal trus…
|
0.29
|
|
computer system
→
ReceivesAction
→
interconnected by phone wires
|
0.29
|
|
computer system
→
ReceivesAction
→
operated by said second operati…
|
0.29
|
|
computer system
→
ReceivesAction
→
regulated by fda
|
0.29
|
|
computer system
→
ReceivesAction
→
supposed to be able to handle 5…
|
0.29
|
|
computer system
→
ReceivesAction
→
used in business
|
0.29
|
|
computer system
→
ReceivesAction
→
utilized by preferred embodiment
|
0.29
|
|
computer system
→
ReceivesAction
→
configured to generate the score
|
0.28
|
|
computer system
→
ReceivesAction
→
connected to workstation
|
0.28
|
|
computer system
→
ReceivesAction
→
coupled to a second i/o
|
0.28
|
|
computer system
→
ReceivesAction
→
coupled to server 16
|
0.28
|
|
computer system
→
ReceivesAction
→
coupled to the interrogator
|
0.28
|
|
computer system
→
ReceivesAction
→
docked
|
0.28
|
|
computer system
→
ReceivesAction
→
embodied in hub
|
0.28
|
|
computer system
→
ReceivesAction
→
embodied in other device
|
0.28
|
|
computer system
→
ReceivesAction
→
embodied in personal computer
|
0.28
|
|
computer system
→
ReceivesAction
→
embodied in workstation
|
0.28
|
|
computer system
→
ReceivesAction
→
incorporated into a land-line t…
|
0.28
|
|
computer system
→
ReceivesAction
→
incorporated into facsimile mac…
|
0.28
|
|
computer system
→
ReceivesAction
→
incorporated into pager
|
0.28
|
|
computer system
→
ReceivesAction
→
incorporated into printer
|
0.28
|
|
computer system
→
ReceivesAction
→
incorporated into scanner
|
0.28
|
|
computer system
→
ReceivesAction
→
practiced in distributed cloud …
|
0.28
|
|
computer system
→
ReceivesAction
→
programmed via instruction
|
0.28
|
|
computer system
→
ReceivesAction
→
re
|
0.28
|
|
computer system
→
ReceivesAction
→
started
|
0.28
|
|
computer system
→
ReceivesAction
→
stored on various types of comp…
|
0.28
|
|
computer system
→
ReceivesAction
→
based upon the information
|
0.27
|
|
computer system
→
ReceivesAction
→
configured to perform method
|
0.27
|
|
computer system
→
ReceivesAction
→
connected to the member
|
0.27
|
|
computer system
→
ReceivesAction
→
connected to the postage server
|
0.27
|
|
computer system
→
ReceivesAction
→
coupled to the processor
|
0.27
|
|
computer system
→
ReceivesAction
→
executed by the processor
|
0.27
|
|
computer system
→
ReceivesAction
→
expanded
|
0.27
|
|
computer system
→
ReceivesAction
→
illustrated as one or more clie…
|
0.27
|
|
computer system
→
ReceivesAction
→
implemented in software
|
0.27
|
|
computer system
→
ReceivesAction
→
included in suitable resource
|
0.27
|
|
computer system
→
ReceivesAction
→
linked in fiber optic link
|
0.27
|
|
computer system
→
ReceivesAction
→
linked in modem
|
0.27
|
|
computer system
→
ReceivesAction
→
maintained
|
0.27
|
|
computer system
→
ReceivesAction
→
managed
|
0.27
|
|
computer system
→
ReceivesAction
→
manufactured with processor
|
0.27
|
|
computer system
→
ReceivesAction
→
monitored
|
0.27
|
|
computer system
→
ReceivesAction
→
operated by said first operatin…
|
0.27
|
|
computer system
→
ReceivesAction
→
outputted on connector
|
0.27
|
|
computer system
→
ReceivesAction
→
outputted on wiring
|
0.27
|
|
computer system
→
ReceivesAction
→
provided by third party
|
0.27
|
|
computer system
→
ReceivesAction
→
provided by vendor
|
0.27
|
|
computer system
→
ReceivesAction
→
returned
|
0.27
|
|
computer system
→
ReceivesAction
→
sold
|
0.27
|
|
computer system
→
ReceivesAction
→
treated as instruction
|
0.27
|
|
computer system
→
ReceivesAction
→
used as platform
|
0.27
|
|
computer system
→
ReceivesAction
→
used in place of computer system
|
0.27
|
|
computer system
→
ReceivesAction
→
used to implement apparatus
|
0.27
|
|
computer system
→
ReceivesAction
→
shown by way of example
|
0.26
|
|
computer system
→
ReceivesAction
→
affected by cryptowall
|
0.25
|
|
computer system
→
ReceivesAction
→
affected by gandcrab
|
0.25
|
|
computer system
→
ReceivesAction
→
activated
|
0.25
|
|
computer system
→
ReceivesAction
→
adapted to receive movement data
|
0.25
|
|
computer system
→
ReceivesAction
→
assembled
|
0.25
|
|
computer system
→
ReceivesAction
→
assigned by time
|
0.25
|
|
computer system
→
ReceivesAction
→
authenticated for access
|
0.25
|
|
computer system
→
ReceivesAction
→
authenticated to receive said i…
|
0.25
|
|
computer system
→
ReceivesAction
→
authorized to be placed in one …
|
0.25
|
|
computer system
→
ReceivesAction
→
based on boolean logic
|
0.25
|
|
computer system
→
ReceivesAction
→
based on stored-program archite…
|
0.25
|
|
computer system
→
ReceivesAction
→
based on the ace
|
0.25
|
|
computer system
→
ReceivesAction
→
based on the edvac
|
0.25
|
|
computer system
→
ReceivesAction
→
captured
|
0.25
|
|
computer system
→
ReceivesAction
→
configured in response
|
0.25
|
|
computer system
→
ReceivesAction
→
configured to generate metrolog…
|
0.25
|
|
computer system
→
ReceivesAction
→
configured to include at least …
|
0.25
|
|
computer system
→
ReceivesAction
→
configured to output the proces…
|
0.25
|
|
computer system
→
ReceivesAction
→
connected to programming unit
|
0.25
|
|
computer system
→
ReceivesAction
→
connected to the screen
|
0.25
|
|
computer system
→
ReceivesAction
→
considered for retrieval
|
0.25
|
|
computer system
→
ReceivesAction
→
considered for storage
|
0.25
|
|
computer system
→
ReceivesAction
→
contemplated
|
0.25
|
|
computer system
→
ReceivesAction
→
controlled by a third-party fac…
|
0.25
|
|
computer system
→
ReceivesAction
→
cooled
|
0.25
|
|
computer system
→
ReceivesAction
→
coupled to a cathode ray tube
|
0.25
|
|
computer system
→
ReceivesAction
→
coupled to onboard device
|
0.25
|
|
computer system
→
ReceivesAction
→
described to connect as computi…
|
0.25
|
|
computer system
→
ReceivesAction
→
determined
|
0.25
|
|
computer system
→
ReceivesAction
→
done in full measure
|
0.25
|
|
computer system
→
ReceivesAction
→
done in half
|
0.25
|
|
computer system
→
ReceivesAction
→
embodied in a client device
|
0.25
|
|
computer system
→
ReceivesAction
→
employed as a trading station
|
0.25
|
|
computer system
→
ReceivesAction
→
envisioned by scientist
|
0.25
|
|
computer system
→
ReceivesAction
→
envisioned by writer
|
0.25
|
|
computer system
→
ReceivesAction
→
exploited as criminal activities
|
0.25
|
|
computer system
→
ReceivesAction
→
exploited as the targets of ter…
|
0.25
|
|
computer system
→
ReceivesAction
→
fixed
|
0.25
|
|
computer system
→
ReceivesAction
→
illustrative of processor
|
0.25
|
|
computer system
→
ReceivesAction
→
implemented in a variety of for…
|
0.25
|
|
computer system
→
ReceivesAction
→
implemented in certain aspects
|
0.25
|
|
computer system
→
ReceivesAction
→
indicated by numeral 100
|
0.25
|
|
computer system
→
ReceivesAction
→
interconnected by other means
|
0.25
|
|
computer system
→
ReceivesAction
→
linked into a computer grid
|
0.25
|
|
computer system
→
ReceivesAction
→
linked into cluster
|
0.25
|
|
computer system
→
ReceivesAction
→
made up of various subsystems
|
0.25
|
|
computer system
→
ReceivesAction
→
manufactured by apple computer
|
0.25
|
|
computer system
→
ReceivesAction
→
operable to map locally generat…
|
0.25
|
|
computer system
→
ReceivesAction
→
operated by partial owners
|
0.25
|
|
computer system
→
ReceivesAction
→
optimized
|
0.25
|
|
computer system
→
ReceivesAction
→
provided in paragraph
|
0.25
|
|
computer system
→
ReceivesAction
→
put into operation
|
0.25
|
|
computer system
→
ReceivesAction
→
received
|
0.25
|
|
computer system
→
ReceivesAction
→
selected
|
0.25
|
|
computer system
→
ReceivesAction
→
shown in accordance
|
0.25
|
|
computer system
→
ReceivesAction
→
structured
|
0.25
|
|
computer system
→
ReceivesAction
→
terminated
|
0.25
|
|
computer system
→
ReceivesAction
→
used at work
|
0.25
|
|
computer system
→
ReceivesAction
→
used by time
|
0.25
|
|
computer system
→
ReceivesAction
→
used to implement teaching
|
0.25
|
|
computer system
→
ReceivesAction
→
used to perform logic synthesis…
|
0.25
|
|
computer system
→
ReceivesAction
→
used to provide assistance
|
0.25
|
|
computer system
→
ReceivesAction
→
used to send electronic message
|
0.25
|
|
computer system
→
ReceivesAction
→
owned by the u.s. army
|
0.24
|
|
computer system
→
ReceivesAction
→
affected by ad
|
0.23
|
|
computer system
→
ReceivesAction
→
infected with virus
|
0.22
|
|
computer system
→
ReceivesAction
→
affected by dharma virus
|
0.21
|
|
computer system
→
ReceivesAction
→
arranged to support virtual mac…
|
0.21
|
|
computer system
→
ReceivesAction
→
linked with networking software…
|
0.21
|
|
computer system
→
ReceivesAction
→
owned by nasa
|
0.21
|
|
computer system
→
ReceivesAction
→
owned by oracle
|
0.21
|
|
computer system
→
ReceivesAction
→
subject to interruption
|
0.21
|
|
computer system
→
ReceivesAction
→
utilized to drive economic grow…
|
0.21
|
|
computer system
→
ReceivesAction
→
affected by cerber
|
0.20
|
|
computer system
→
ReceivesAction
→
replaced
|
0.20
|
|
computer system
→
ReceivesAction
→
built
|
0.19
|
|
computer system
→
ReceivesAction
→
affected by cryptconsole
|
0.18
|
|
computer system
→
ReceivesAction
→
affected by cryptolocker
|
0.18
|
|
computer system
→
ReceivesAction
→
affected by everbe
|
0.18
|
|
computer system
→
ReceivesAction
→
affected by globe
|
0.18
|
|
computer system
→
ReceivesAction
→
affected by iphone
|
0.18
|
|
computer system
→
ReceivesAction
→
affected by ransomware
|
0.18
|
|
computer system
→
ReceivesAction
→
restarted
|
0.18
|
|
computer system
→
ReceivesAction
→
attacked
|
0.16
|
|
computer system
→
ReceivesAction
→
connected to the university net…
|
0.16
|
|
computer system
→
ReceivesAction
→
difficult to secure
|
0.16
|
|
computer system
→
ReceivesAction
→
protected against possible haza…
|
0.13
|
|
computer system
→
ReceivesAction
→
protected against the provider
|
0.13
|
|
computer system
→
ReceivesAction
→
connected to server
|
0.11
|
|
computer system
→
ReceivesAction
→
protected against neither the t…
|
0.11
|
|