| system → ReceivesAction → infected | 0.66 | |
| system → ReceivesAction → patched | 0.60 | |
| system → ReceivesAction → affected | 0.50 | |
| system → ReceivesAction → infected by the worm | 0.49 | |
| system → ReceivesAction → compromised | 0.46 | |
| system → ReceivesAction → protected | 0.40 | |
| system → ReceivesAction → encrypted | 0.38 | |
| system → ReceivesAction → built | 0.37 | |
| system → ReceivesAction → disinfected | 0.32 | |
| system → ReceivesAction → configured | 0.31 | |
| system → ReceivesAction → described | 0.30 | |
| system → ReceivesAction → developed by fireeye | 0.30 | |
| system → ReceivesAction → connected to the internet | 0.28 | |
| system → ReceivesAction → accessed | 0.25 | |
| system → ReceivesAction → rebooted | 0.25 | |
| system → ReceivesAction → scanned | 0.25 | |
| system → ReceivesAction → easy to use | 0.16 | |
| system → ReceivesAction → exploited by threat | 0.16 | |
| system → ReceivesAction → infected by malware | 0.16 | |
| system → ReceivesAction → occasioned by participation | 0.16 |