| tactic → ReceivesAction → employed | 0.71 | |
| tactic → ReceivesAction → discussed | 0.59 | |
| tactic → ReceivesAction → utilized to market debentures | 0.56 | |
| tactic → ReceivesAction → put in place | 0.56 | |
| tactic → ReceivesAction → aimed | 0.55 | |
| tactic → ReceivesAction → chosen | 0.52 | |
| tactic → ReceivesAction → decided | 0.51 | |
| tactic → ReceivesAction → developed | 0.50 | |
| tactic → ReceivesAction → based on characteristic | 0.46 | |
| tactic → ReceivesAction → based on individual strengths | 0.46 | |
| tactic → ReceivesAction → based on instinctive reactions | 0.46 | |
| tactic → ReceivesAction → learned | 0.46 | |
| tactic → ReceivesAction → used by terrorist | 0.43 | |
| tactic → ReceivesAction → used by politician | 0.43 | |
| tactic → ReceivesAction → repeated | 0.42 | |
| tactic → ReceivesAction → changed | 0.41 | |
| tactic → ReceivesAction → revised | 0.40 | |
| tactic → ReceivesAction → confused | 0.39 | |
| tactic → ReceivesAction → employed by group | 0.39 | |
| tactic → ReceivesAction → used by attacker | 0.39 | |
| tactic → ReceivesAction → designed | 0.39 | |
| tactic → ReceivesAction → used by lawyer | 0.38 | |
| tactic → ReceivesAction → used by the government | 0.38 | |
| tactic → ReceivesAction → based | 0.37 | |
| tactic → ReceivesAction → created | 0.37 | |
| tactic → ReceivesAction → used to gain objective | 0.37 | |
| tactic → ReceivesAction → used by police | 0.35 | |
| tactic → ReceivesAction → seen as belligerence | 0.35 | |
| tactic → ReceivesAction → seen as recalcitrance | 0.35 | |
| tactic → ReceivesAction → intertwined | 0.35 | |
| tactic → ReceivesAction → played | 0.33 | |
| tactic → ReceivesAction → tested | 0.33 | |
| tactic → ReceivesAction → used in combination | 0.33 | |
| tactic → ReceivesAction → aligned | 0.32 | |
| tactic → ReceivesAction → covered | 0.32 | |
| tactic → ReceivesAction → outlined | 0.32 | |
| tactic → ReceivesAction → used by party | 0.32 | |
| tactic → ReceivesAction → used in syria | 0.32 | |
| tactic → ReceivesAction → practiced | 0.31 | |
| tactic → ReceivesAction → put | 0.31 | |
| tactic → ReceivesAction → used by corporation | 0.31 | |
| tactic → ReceivesAction → used in the past | 0.31 | |
| tactic → ReceivesAction → described | 0.30 | |
| tactic → ReceivesAction → documented | 0.30 | |
| tactic → ReceivesAction → explored | 0.30 | |
| tactic → ReceivesAction → improved | 0.30 | |
| tactic → ReceivesAction → introduced | 0.30 | |
| tactic → ReceivesAction → used by bell | 0.30 | |
| tactic → ReceivesAction → used by big tobacco | 0.30 | |
| tactic → ReceivesAction → used by individual | 0.30 | |
| tactic → ReceivesAction → encountered in third world coun… | 0.29 | |
| tactic → ReceivesAction → used by team | 0.28 | |
| tactic → ReceivesAction → flawed | 0.28 | |
| tactic → ReceivesAction → proven to be effective | 0.28 | |
| tactic → ReceivesAction → allowed | 0.28 | |
| tactic → ReceivesAction → combined with the hit-box system | 0.28 | |
| tactic → ReceivesAction → completed | 0.28 | |
| tactic → ReceivesAction → exposed in 2 nephi | 0.28 | |
| tactic → ReceivesAction → proven | 0.28 | |
| tactic → ReceivesAction → used by hacker | 0.28 | |
| tactic → ReceivesAction → used by organization | 0.28 | |
| tactic → ReceivesAction → used by rebel | 0.28 | |
| tactic → ReceivesAction → used to deceive new recruits | 0.28 | |
| tactic → ReceivesAction → likely to fail | 0.26 | |
| tactic → ReceivesAction → used by the nazis | 0.26 | |
| tactic → ReceivesAction → used in iraq | 0.26 | |
| tactic → ReceivesAction → banned | 0.25 | |
| tactic → ReceivesAction → caught | 0.25 | |
| tactic → ReceivesAction → designed to exert economic pres… | 0.25 | |
| tactic → ReceivesAction → developed by the germans | 0.25 | |
| tactic → ReceivesAction → developed to have positive psyc… | 0.25 | |
| tactic → ReceivesAction → employed by cult | 0.25 | |
| tactic → ReceivesAction → employed by healthcare providers | 0.25 | |
| tactic → ReceivesAction → employed by russia | 0.25 | |
| tactic → ReceivesAction → implemented as one or more spec… | 0.25 | |
| tactic → ReceivesAction → launched under the name of proj… | 0.25 | |
| tactic → ReceivesAction → linked to strategy | 0.25 | |
| tactic → ReceivesAction → rejected | 0.25 | |
| tactic → ReceivesAction → seen in abkhazia | 0.25 | |
| tactic → ReceivesAction → seen in south ossetia | 0.25 | |
| tactic → ReceivesAction → shown in top-left diagram | 0.25 | |
| tactic → ReceivesAction → used a lot | 0.25 | |
| tactic → ReceivesAction → used by bank | 0.25 | |
| tactic → ReceivesAction → used by douglas | 0.25 | |
| tactic → ReceivesAction → used by hamas | 0.25 | |
| tactic → ReceivesAction → used by hannibal | 0.25 | |
| tactic → ReceivesAction → used by japan | 0.25 | |
| tactic → ReceivesAction → used by officer | 0.25 | |
| tactic → ReceivesAction → used by state | 0.25 | |
| tactic → ReceivesAction → used by the soviets | 0.25 | |
| tactic → ReceivesAction → used by the viet cong | 0.25 | |
| tactic → ReceivesAction → used in interrogation | 0.25 | |
| tactic → ReceivesAction → used in sale | 0.25 | |
| tactic → ReceivesAction → used in the future | 0.25 | |
| tactic → ReceivesAction → used to facilitate communication | 0.25 | |
| tactic → ReceivesAction → used to influence public policy | 0.25 | |
| tactic → ReceivesAction → used to put book | 0.25 | |
| tactic → ReceivesAction → employed by the islamic state | 0.25 | |
| tactic → ReceivesAction → used by scammer | 0.25 | |
| tactic → ReceivesAction → used by insurgent | 0.23 | |
| tactic → ReceivesAction → used in venezuela | 0.23 | |
| tactic → ReceivesAction → used by criminal | 0.23 | |
| tactic → ReceivesAction → used to stifle differences of o… | 0.23 | |
| tactic → ReceivesAction → removed | 0.20 | |
| tactic → ReceivesAction → adopted by the store | 0.19 | |
| tactic → ReceivesAction → avoided | 0.19 | |
| tactic → ReceivesAction → difficult to detect | 0.19 | |
| tactic → ReceivesAction → exposed | 0.19 | |
| tactic → ReceivesAction → followed | 0.19 | |
| tactic → ReceivesAction → used by cybercriminal | 0.19 | |
| tactic → ReceivesAction → used by north korea | 0.19 | |
| tactic → ReceivesAction → used by prosecutor | 0.19 | |
| tactic → ReceivesAction → accused | 0.16 | |
| tactic → ReceivesAction → applied to our bars | 0.16 | |
| tactic → ReceivesAction → applied to pub | 0.16 | |
| tactic → ReceivesAction → applied to restaurant | 0.16 | |
| tactic → ReceivesAction → complicated by three-dimensiona… | 0.16 | |
| tactic → ReceivesAction → discredited | 0.16 | |
| tactic → ReceivesAction → easy to learn | 0.16 | |
| tactic → ReceivesAction → employed in germany | 0.16 | |
| tactic → ReceivesAction → justified against ferocious fig… | 0.16 | |
| tactic → ReceivesAction → maintained | 0.16 | |
| tactic → ReceivesAction → monitored by criminal groups | 0.16 | |
| tactic → ReceivesAction → monitored by fixated individuals | 0.16 | |
| tactic → ReceivesAction → monitored by terrorist | 0.16 | |
| tactic → ReceivesAction → prohibited | 0.16 | |
| tactic → ReceivesAction → taken up by democrats | 0.16 | |
| tactic → ReceivesAction → used against child | 0.16 | |
| tactic → ReceivesAction → used by big oil | 0.16 | |
| tactic → ReceivesAction → used by david cameron | 0.16 | |
| tactic → ReceivesAction → used by judge | 0.16 | |
| tactic → ReceivesAction → used by union | 0.16 | |
| tactic → ReceivesAction → used in cuba | 0.16 | |
| tactic → ReceivesAction → used in negotiation | 0.16 | |
| tactic → ReceivesAction → used to find information | 0.16 | |
| tactic → ReceivesAction → used to silence arrest | 0.16 | |
| tactic → ReceivesAction → used to silence death threats | 0.16 | |
| tactic → ReceivesAction → used to silence sexual assault | 0.16 | |
| tactic → ReceivesAction → used by side | 0.14 | |
| tactic → ReceivesAction → used in america | 0.03 |