| trojan → ReceivesAction → distributed | 0.57 | |
| trojan → ReceivesAction → installed | 0.56 | |
| trojan → ReceivesAction → employed by hacker | 0.56 | |
| trojan → ReceivesAction → hidden | 0.51 | |
| trojan → ReceivesAction → detected | 0.47 | |
| trojan → ReceivesAction → supported | 0.47 | |
| trojan → ReceivesAction → removed | 0.44 | |
| trojan → ReceivesAction → employed by cyber-thieves | 0.43 | |
| trojan → ReceivesAction → known for their multitasking | 0.42 | |
| trojan → ReceivesAction → hidden within another program | 0.41 | |
| trojan → ReceivesAction → recognized | 0.41 | |
| trojan → ReceivesAction → known for stealthiness | 0.40 | |
| trojan → ReceivesAction → disguised as legitimate software | 0.40 | |
| trojan → ReceivesAction → discovered | 0.39 | |
| trojan → ReceivesAction → maintained | 0.38 | |
| trojan → ReceivesAction → posted | 0.38 | |
| trojan → ReceivesAction → difficult to detect | 0.35 | |
| trojan → ReceivesAction → created | 0.34 | |
| trojan → ReceivesAction → launched | 0.34 | |
| trojan → ReceivesAction → started | 0.34 | |
| trojan → ReceivesAction → stopped | 0.34 | |
| trojan → ReceivesAction → tested | 0.34 | |
| trojan → ReceivesAction → placed | 0.33 | |
| trojan → ReceivesAction → designed to be more annoying | 0.32 | |
| trojan → ReceivesAction → followed by worm | 0.31 | |
| trojan → ReceivesAction → distributed via fake online sca… | 0.29 | |
| trojan → ReceivesAction → exploited | 0.29 | |
| trojan → ReceivesAction → attached to free game | 0.29 | |
| trojan → ReceivesAction → attached to other utility | 0.29 | |
| trojan → ReceivesAction → executed on compromised computer | 0.29 | |
| trojan → ReceivesAction → written | 0.29 | |
| trojan → ReceivesAction → written in c++ | 0.29 | |
| trojan → ReceivesAction → used by swindler | 0.27 | |
| trojan → ReceivesAction → detected by trend micro | 0.25 | |
| trojan → ReceivesAction → discovered at the l5 point | 0.25 | |
| trojan → ReceivesAction → driven | 0.25 | |
| trojan → ReceivesAction → formed beyond jupiter’s current… | 0.25 | |
| trojan → ReceivesAction → impossible to reveal | 0.25 | |
| trojan → ReceivesAction → packed with upx | 0.25 | |
| trojan → ReceivesAction → used in conjunction | 0.25 | |
| trojan → ReceivesAction → compared to parasite | 0.23 | |
| trojan → ReceivesAction → known for usability | 0.23 | |
| trojan → ReceivesAction → spread by some form of social e… | 0.23 | |
| trojan → ReceivesAction → disguised as game | 0.20 | |
| trojan → ReceivesAction → known for their high effectiven… | 0.20 | |
| trojan → ReceivesAction → advised of the possibility of s… | 0.16 | |
| trojan → ReceivesAction → caught | 0.16 | |
| trojan → ReceivesAction → disguised as a screen saver | 0.16 | |
| trojan → ReceivesAction → known for secrecy | 0.16 | |
| trojan → ReceivesAction → placed into heavy rotation | 0.16 | |
| trojan → ReceivesAction → unable to penetrate victim's co… | 0.16 | |
| trojan → ReceivesAction → undone by penalty | 0.16 | |
| trojan → ReceivesAction → undone by poor play | 0.16 | |
| trojan → ReceivesAction → undone by turnover | 0.16 | |
| trojan → ReceivesAction → used as tool | 0.16 |