| hacker → HasA → the capability | 0.49 | |
| hacker → HasA → a field day | 0.45 | |
| hacker → HasA → username | 0.39 | |
| hacker → HasA → upper hand | 0.38 | |
| hacker → HasA → malicious intent | 0.35 | |
| hacker → HasA → tool | 0.33 | |
| hacker → HasA → key | 0.31 | |
| hacker → HasA → eye | 0.30 | |
| hacker → HasA → all the information | 0.29 | |
| hacker → HasA → connection | 0.29 | |
| hacker → HasA → complete control | 0.29 | |
| hacker → HasA → email address | 0.28 | |
| hacker → HasA → free reign | 0.27 | |
| hacker → HasA → mean | 0.26 | |
| hacker → HasA → the power | 0.25 | |
| hacker → HasA → more opportunities | 0.23 | |
| hacker → HasA → enough experience | 0.22 | |
| hacker → HasA → enough information | 0.22 | |
| hacker → HasA → dates of birth | 0.21 | |
| hacker → HasA → incentive | 0.21 | |
| hacker → HasA → many ways | 0.21 |