code
→
ReceivesAction
→
executed
|
0.68
|
|
code
→
ReceivesAction
→
read
|
0.66
|
|
code
→
ReceivesAction
→
written
|
0.37
|
|
code
→
ReceivesAction
→
executed by the computer
|
0.35
|
|
code
→
ReceivesAction
→
prohibited
|
0.34
|
|
code
→
ReceivesAction
→
exploited
|
0.32
|
|
code
→
ReceivesAction
→
written by hacker
|
0.28
|
|
code
→
ReceivesAction
→
analyzed
|
0.25
|
|
code
→
ReceivesAction
→
compiled
|
0.25
|
|
code
→
ReceivesAction
→
entered
|
0.25
|
|
code
→
ReceivesAction
→
required
|
0.25
|
|
code
→
ReceivesAction
→
signed
|
0.25
|
|
code
→
ReceivesAction
→
compromised
|
0.21
|
|
code
→
ReceivesAction
→
embedded in larger, legitimate …
|
0.21
|
|