Created
December 23, 2014 02:51
-
-
Save jeremybmerrill/0694a722bc3556b9332b to your computer and use it in GitHub Desktop.
Most common `cyber X` word-pairs in certain New York Times, ProPublica, Washington Post, Politico articles and congress speeches since sometime in 2013
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
cyber security: 384 | |
cyber threats: 87 | |
cyber attacks: 826 | |
cyber businesses: 1 | |
cyber protection: 1 | |
cyber espionage: 10 | |
cyber surveillance: 1 | |
cyber theft: 2 | |
cyber area: 1 | |
cyber crime: 9 | |
cyber criminals: 76 | |
cyber to: 2 | |
cyber then: 1 | |
cyber networks: 1 | |
cyber and: 83 | |
cybersecurity: 2386 | |
cyber threat: 36 | |
cyber defenses: 3 | |
cyber pearl: 1 | |
cyber workforce: 4 | |
cyber skills: 1 | |
cybersecutity: 1 | |
cyber capabilities: 3 | |
cyber warriors: 1 | |
cyber attacks--a: 3 | |
cyber warfare: 2 | |
cyber-enabled: 2 | |
cyber crimes: 2 | |
cyber center: 196 | |
cyber space: 21 | |
cyber attack: 145 | |
cyber spying: 45 | |
cyber has: 1 | |
cyber theres: 1 | |
cyber response: 1 | |
cyber because: 1 | |
cyberspace: 222 | |
cyberattacks: 130 | |
cyberattack: 164 | |
cybercrime: 106 | |
cyber-attacks: 134 | |
cyber-espionage: 6 | |
cyber-attack: 2 | |
cyber law: 58 | |
cyberthreats: 27 | |
cyberwarriors: 2 | |
cyberwarfare: 9 | |
cyberweapons: 6 | |
cyberarms: 1 | |
cyber she: 1 | |
cyberoperations: 2 | |
cybertools: 1 | |
cyber statecraft: 2 | |
cyberwar: 7 | |
cybercampaign: 1 | |
cyberpower: 1 | |
cyberoperation: 2 | |
cyber-tender: 1 | |
cyber currencys: 1 | |
cyber defensive: 2 | |
cyber weapons: 4 | |
cyber insurance: 1 | |
cyber-logrolling: 1 | |
cyber-seniors: 1 | |
cyber liability: 1 | |
cyber-fraud: 93 | |
cyber dust: 2 | |
cybercriminals: 68 | |
cyberspying: 3 | |
cybercops: 1 | |
cyber road: 1 | |
cyber incidents: 2 | |
cyber realm: 5 | |
cyber controls: 1 | |
cyber penetrations: 1 | |
cyber breach: 23 | |
cyber commandwrote: 1 | |
'cyber ': 1 | |
cyber-related: 3 | |
cyberdefense: 6 | |
cyber thieves: 3 | |
cyber engineers: 1 | |
cyber revolution: 1 | |
cyberskills: 1 | |
cyberstrategy: 1 | |
cyber command: 9 | |
cyberrealm: 1 | |
cyber-security: 8 | |
cybersec: 7 | |
cyber challenges: 1 | |
cyber intrusions: 3 | |
cyber-extremism: 1 | |
cyber bad: 1 | |
cyber breaches: 2 | |
cyber terrorism: 1 | |
cyberbullying: 5 | |
cyber operation: 1 | |
cyber assets: 1 | |
cyber-cassandras: 1 | |
cyber-physical: 1 | |
cyber intruders: 1 | |
cyber infiltration: 1 | |
cyber strategy: 1 | |
cyber commission: 1 | |
cyber realma: 1 | |
cyber bills: 1 | |
cyber-utopian: 1 | |
cyberhacking: 2 | |
cyber-conference: 1 | |
cyberdefenses: 1 | |
cyberintrusion: 1 | |
cyber matters: 1 | |
cyber activities: 1 | |
cyber education: 1 | |
cyber strategic: 1 | |
cyber training: 1 | |
cyber-canoodling: 1 | |
cyber-smarties: 1 | |
cyber-geeks: 2 | |
cyberark: 1 | |
cybersecurity-software: 1 | |
cyber issues: 1 | |
cybercrimes: 2 | |
cyber energy: 1 | |
cyber defense: 1 | |
cyber-bullied: 22 | |
cyber-radicalization: 1 | |
cyber world: 3 | |
cyber mission: 2 | |
cyber attackers: 2 | |
cyber technologies: 1 | |
cyber intelligence: 1 | |
cyberculture: 1 | |
cyber undertaker: 1 | |
cyber age: 1 | |
cyber insu: 1 | |
cyberchase: 1 | |
cyber criminal: 1 | |
cyberintelligence: 1 | |
cyber-units: 4 | |
cyber-fight: 1 | |
cyber-workers: 1 | |
cyber-central: 1 | |
cyber-unit: 2 | |
cyber-products: 1 | |
cyber-focused: 1 | |
cyber-learning: 1 | |
cyber summer: 1 | |
cyber-education: 1 | |
cyber-experts: 1 | |
cyber-bureau: 1 | |
cyber they: 1 | |
cyber-class: 1 | |
cybersecuritys: 1 | |
cyber right: 1 | |
cyber technology: 1 | |
cyber-insurance: 5 | |
cyber manufacturers: 1 | |
cyber-law: 1 | |
cyber-breach: 1 | |
cyberespionage: 15 | |
cyberworld: 1 | |
cybertheft: 1 | |
cyber-command: 1 | |
cyber-spying: 1 | |
cyber division: 2 | |
cyber intrusion: 1 | |
cyber-risks: 1 | |
cyber slings: 1 | |
cyberbullies: 1 | |
cyber-howls: 1 | |
cyber seems: 1 | |
cyber patrols: 1 | |
cyber-capabilities: 1 | |
cybersecuri: 1 | |
cyberattacked: 1 | |
cyber component: 1 | |
cyber is: 1 | |
cybercriminal: 1 | |
cyber consequences: 2 | |
cyber library: 2 | |
cyber-stalkers-eye: 1 | |
cyberthreat: 3 | |
cyber travels: 1 | |
cyber-bullying: 1 | |
cyber such: 1 | |
cyber marketplaces: 1 | |
cyber monday: 727 | |
cyber-forensics: 1 | |
cyber dialogue: 1 | |
cyber mesa: 1 | |
cybertechnology: 2 | |
cyber risk: 1 | |
cybernetworks: 1 | |
cyber offensive: 1 | |
cyber hit: 1 | |
cyber experts: 1 | |
cybersystems: 1 | |
cyber story: 1 | |
cyber-detectives: 1 | |
cyber-criminal: 1 | |
cyber-operations: 1 | |
cyber-tools: 1 | |
cyber-capability: 1 | |
cyberweapon: 1 | |
cybersabotage: 1 | |
cyber bullying: 1 | |
cyber ghost: 1 | |
cyber event: 1 | |
cyber partnership: 1 | |
cyber mercenaries: 1 | |
cyber mondays: 1 | |
cyber-mnemonics: 1 | |
cyber operations: 1 | |
cyber-snooping: 1 | |
cyber-pearl: 1 | |
cyber in: 1 | |
cyberconflict: 1 | |
cyber effort: 1 | |
cyberwars: 1 | |
cyber vulnerability: 1 | |
cyber-attacker: 1 | |
cybersleuths: 2 | |
cyber-intrusions: 1 | |
cyberstalker: 1 | |
cyberarmies: 1 | |
cyberforces: 2 | |
cyberbattlefields: 1 | |
cyber he: 1 | |
cyber hate-fest: 1 | |
cyberterror: 1 | |
cyber domain: 1 | |
cyber-defense: 1 | |
cyberthieves: 2 | |
cybermissile: 1 | |
cyberterrorism: 3 | |
cyber actions: 1 | |
cyber was: 1 | |
cyber nightmares: 2 | |
cyber-war: 1 | |
cyber means: 1 | |
cyber conflict: 2 | |
cyber watchers: 1 | |
cyber counsel: 1 | |
cyber conflicts: 1 | |
noncyber: 1 | |
cyber talks: 1 | |
cyber battlefield: 1 | |
cyber isnt: 1 | |
cyber dependencies: 1 | |
cyber counterattack: 2 | |
cyber social-justice: 1 | |
cyber voice: 1 | |
cyberoffensive: 1 | |
cyberassailants: 1 | |
cyber behavior: 1 | |
cyberacts: 1 | |
cyberpolicy: 1 | |
cyber vandalism: 3 | |
cyber-blackmail: 1 | |
cyberattackers: 1 | |
cyber-abyss: 1 | |
cyber-defenses: 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment