| code → ReceivesAction → executed | 0.68 | |
| code → ReceivesAction → read | 0.66 | |
| code → ReceivesAction → written | 0.37 | |
| code → ReceivesAction → executed by the computer | 0.35 | |
| code → ReceivesAction → prohibited | 0.34 | |
| code → ReceivesAction → exploited | 0.32 | |
| code → ReceivesAction → written by hacker | 0.28 | |
| code → ReceivesAction → analyzed | 0.25 | |
| code → ReceivesAction → compiled | 0.25 | |
| code → ReceivesAction → entered | 0.25 | |
| code → ReceivesAction → required | 0.25 | |
| code → ReceivesAction → signed | 0.25 | |
| code → ReceivesAction → compromised | 0.21 | |
| code → ReceivesAction → embedded in larger, legitimate … | 0.21 |