system
→
ReceivesAction
→
infected
|
0.66
|
|
system
→
ReceivesAction
→
patched
|
0.60
|
|
system
→
ReceivesAction
→
affected
|
0.50
|
|
system
→
ReceivesAction
→
infected by the worm
|
0.49
|
|
system
→
ReceivesAction
→
compromised
|
0.46
|
|
system
→
ReceivesAction
→
protected
|
0.40
|
|
system
→
ReceivesAction
→
encrypted
|
0.38
|
|
system
→
ReceivesAction
→
built
|
0.37
|
|
system
→
ReceivesAction
→
disinfected
|
0.32
|
|
system
→
ReceivesAction
→
configured
|
0.31
|
|
system
→
ReceivesAction
→
described
|
0.30
|
|
system
→
ReceivesAction
→
developed by fireeye
|
0.30
|
|
system
→
ReceivesAction
→
connected to the internet
|
0.28
|
|
system
→
ReceivesAction
→
accessed
|
0.25
|
|
system
→
ReceivesAction
→
rebooted
|
0.25
|
|
system
→
ReceivesAction
→
scanned
|
0.25
|
|
system
→
ReceivesAction
→
easy to use
|
0.16
|
|
system
→
ReceivesAction
→
exploited by threat
|
0.16
|
|
system
→
ReceivesAction
→
infected by malware
|
0.16
|
|
system
→
ReceivesAction
→
occasioned by participation
|
0.16
|
|