hacker: gain access to computer systems

from Quasimodo
0.2 0.4 0.6 0.8 Plausible Typical Remarkable Salient

Related concepts

Parents criminal
Weight: 0.63
, outsider
Weight: 0.63
, person
Weight: 0.57
, third party
Weight: 0.57
, individual
Weight: 0.55
Siblings spammer
Weight: 0.33
, pickpocket
Weight: 0.32
, terrorist
Weight: 0.32
, thief
Weight: 0.32

Related properties

Property Similarity
gain access to computer systems 1.00
gain access to something 0.87
gain access to comany networks 0.87
break into computer systems 0.86
get access to unencrypted data 0.80
break into computers 0.79
use virtual machines 0.77

Priors about this statement

Cues

0.2 0.4 0.6 0.8 Joint Necessity Sufficiency Implication Entailment Contradiction Entropy

Evidence

0.2 0.4 0.6 0.8 Plausible Typical Remarkable Salient

Clauses

Salient implies Plausible

0.17
Rule weight: 0.28
Evidence weight: 0.62
Similarity weight: 1.00
Evidence: 0.43
Plausible(hacker, gain access to computer systems)
Evidence: 0.66
¬ Salient(hacker, gain access to computer systems)

Similarity expansion

0.71
Rule weight: 0.85
Evidence weight: 0.97
Similarity weight: 0.86
Evidence: 0.91
Remarkable(hacker, gain access to computer systems)
Evidence: 0.40
¬ Remarkable(hacker, break into computer systems)
0.65
Rule weight: 0.85
Evidence weight: 0.97
Similarity weight: 0.79
Evidence: 0.91
Remarkable(hacker, gain access to computer systems)
Evidence: 0.34
¬ Remarkable(hacker, break into computers)
0.64
Rule weight: 0.85
Evidence weight: 0.97
Similarity weight: 0.77
Evidence: 0.25
Typical(hacker, gain access to computer systems)
Evidence: 0.03
¬ Typical(hacker, use virtual machines)
0.63
Rule weight: 0.85
Evidence weight: 0.85
Similarity weight: 0.86
Evidence: 0.66
Salient(hacker, gain access to computer systems)
Evidence: 0.43
¬ Salient(hacker, break into computer systems)
0.60
Rule weight: 0.85
Evidence weight: 0.92
Similarity weight: 0.77
Evidence: 0.91
Remarkable(hacker, gain access to computer systems)
Evidence: 0.98
¬ Remarkable(hacker, use virtual machines)
0.58
Rule weight: 0.85
Evidence weight: 0.86
Similarity weight: 0.79
Evidence: 0.66
Salient(hacker, gain access to computer systems)
Evidence: 0.41
¬ Salient(hacker, break into computers)
0.57
Rule weight: 0.85
Evidence weight: 0.87
Similarity weight: 0.77
Evidence: 0.43
Plausible(hacker, gain access to computer systems)
Evidence: 0.23
¬ Plausible(hacker, use virtual machines)
0.54
Rule weight: 0.85
Evidence weight: 0.83
Similarity weight: 0.77
Evidence: 0.66
Salient(hacker, gain access to computer systems)
Evidence: 0.51
¬ Salient(hacker, use virtual machines)
0.53
Rule weight: 0.85
Evidence weight: 0.72
Similarity weight: 0.86
Evidence: 0.43
Plausible(hacker, gain access to computer systems)
Evidence: 0.50
¬ Plausible(hacker, break into computer systems)
0.48
Rule weight: 0.85
Evidence weight: 0.71
Similarity weight: 0.79
Evidence: 0.43
Plausible(hacker, gain access to computer systems)
Evidence: 0.51
¬ Plausible(hacker, break into computers)
0.39
Rule weight: 0.85
Evidence weight: 0.54
Similarity weight: 0.86
Evidence: 0.25
Typical(hacker, gain access to computer systems)
Evidence: 0.62
¬ Typical(hacker, break into computer systems)
0.33
Rule weight: 0.85
Evidence weight: 0.50
Similarity weight: 0.79
Evidence: 0.25
Typical(hacker, gain access to computer systems)
Evidence: 0.66
¬ Typical(hacker, break into computers)

Typical and Remarkable implies Salient

0.13
Rule weight: 0.14
Evidence weight: 0.92
Similarity weight: 1.00
Evidence: 0.66
Salient(hacker, gain access to computer systems)
Evidence: 0.25
¬ Typical(hacker, gain access to computer systems)
Evidence: 0.91
¬ Remarkable(hacker, gain access to computer systems)

Typical implies Plausible

0.41
Rule weight: 0.48
Evidence weight: 0.86
Similarity weight: 1.00
Evidence: 0.43
Plausible(hacker, gain access to computer systems)
Evidence: 0.25
¬ Typical(hacker, gain access to computer systems)