| Typicality: | 0.340 |
| Saliency: | 0.442 |
| on the victim’s computer | 11 | location |
| remotely | 8 | manner |
| into the blog’s pages | 7 | transitive-object |
| hacker → execute → malicious code | 28 |
| hacker → place → malicious code | 10 |
| hacker → plant → malicious code | 10 |
| hacker → run → malicious code | 7 |
| hacker → use → malicious code | 7 |
| hacker → create → malicious code | 5 |
| hacker → write → malicious code | 4 |
| hacker → put → malicious code | 4 |
| negative | neutral | positive |
| 0.666 | 0.308 | 0.026 |
| Raw frequency | 75 |
| Normalized frequency | 0.442 |
| Modifier score | 0.467 |
| Perplexity | 100.850 |