Fig. 8From: Cyber risk prediction through social media big data analytics and statistical machine learningPyramid analysis results. This figure shows, once more, that apache and exploit become the two most twitted and then followed by a vulnerability in the CVE databaseBack to article page