{
"@context": [
"http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
],
"@id": "/c/en/hacking/n",
"edges": [
{
"@id": "/a/[/r/IsA/,/c/en/hacking/n/opencyc/penetrating_computer_network/,/c/en/computer_activity/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_activity/n",
"@type": "Node",
"label": "computer activity",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_activity"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n/opencyc/penetrating_computer_network",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/american_football/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/american_football",
"@type": "Node",
"label": "american football",
"language": "en",
"term": "/c/en/american_football"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/HasContext",
"@type": "Relation",
"label": "HasContext"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/horseback/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/horseback",
"@type": "Node",
"label": "horseback",
"language": "en",
"term": "/c/en/horseback"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/RelatedTo",
"@type": "Relation",
"label": "RelatedTo"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/lisp_hacking/n/,/c/en/hacking/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/hacking/n",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/lisp_hacking/n",
"@type": "Node",
"label": "lisp hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/lisp_hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/hacking/n/opencyc/penetrating_computer_network/,/c/en/cracking/n/opencyc/cracking_compromising_security/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/cracking/n/opencyc/cracking_compromising_security",
"@type": "Node",
"label": "cracking",
"language": "en",
"sense_label": "n",
"term": "/c/en/cracking"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n/opencyc/penetrating_computer_network",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/massage/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/massage",
"@type": "Node",
"label": "massage",
"language": "en",
"term": "/c/en/massage"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/HasContext",
"@type": "Relation",
"label": "HasContext"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/SimilarTo/,/c/en/hacking/n/,/c/fr/cybercrime/]",
"@type": "Edge",
"dataset": "/d/wiktionary/fr",
"end": {
"@id": "/c/fr/cybercrime",
"@type": "Node",
"label": "cybercrime",
"language": "fr",
"term": "/c/fr/cybercrime"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/SimilarTo",
"@type": "Relation",
"label": "SimilarTo"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/fr/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/fr",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/Synonym/,/c/en/hacking/n/wikt/en_2/,/c/fi/hakkerointi/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/fi/hakkerointi",
"@type": "Node",
"label": "hakkerointi",
"language": "fi",
"term": "/c/fi/hakkerointi"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/Synonym",
"@type": "Relation",
"label": "Synonym"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/ExternalURL/,/c/en/hacking/n/,/http://sw.opencyc.org/2012/05/10/concept/en/Hacking/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking",
"@type": "Node",
"label": "Hacking",
"path": "/2012/05/10/concept/en/Hacking",
"site": "sw.opencyc.org",
"site_available": false,
"term": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/ExternalURL",
"@type": "Relation",
"label": "ExternalURL"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/hacking/n/opencyc/hacking_coughing/,/c/en/cough/n/opencyc/coughing/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/cough/n/opencyc/coughing",
"@type": "Node",
"label": "cough",
"language": "en",
"sense_label": "n",
"term": "/c/en/cough"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n/opencyc/hacking_coughing",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/ExternalURL/,/c/en/hacking/n/opencyc/penetrating_computer_network/,/http://sw.opencyc.org/2012/05/10/concept/en/PenetratingAComputerNetwork/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "http://sw.opencyc.org/2012/05/10/concept/en/PenetratingAComputerNetwork",
"@type": "Node",
"label": "PenetratingAComputerNetwork",
"path": "/2012/05/10/concept/en/PenetratingAComputerNetwork",
"site": "sw.opencyc.org",
"site_available": false,
"term": "http://sw.opencyc.org/2012/05/10/concept/en/PenetratingAComputerNetwork"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/ExternalURL",
"@type": "Relation",
"label": "ExternalURL"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n/opencyc/penetrating_computer_network",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/sports/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/sports",
"@type": "Node",
"label": "sports",
"language": "en",
"term": "/c/en/sports"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/HasContext",
"@type": "Relation",
"label": "HasContext"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/coughing/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/coughing",
"@type": "Node",
"label": "coughing",
"language": "en",
"term": "/c/en/coughing"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/RelatedTo",
"@type": "Relation",
"label": "RelatedTo"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/cracker/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/cracker",
"@type": "Node",
"label": "cracker",
"language": "en",
"term": "/c/en/cracker"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/RelatedTo",
"@type": "Relation",
"label": "RelatedTo"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/computing/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/computing",
"@type": "Node",
"label": "computing",
"language": "en",
"term": "/c/en/computing"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/HasContext",
"@type": "Relation",
"label": "HasContext"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/soccer/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/soccer",
"@type": "Node",
"label": "soccer",
"language": "en",
"term": "/c/en/soccer"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/HasContext",
"@type": "Relation",
"label": "HasContext"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/hacking/n/,/c/en/computer_programming/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_programming/n",
"@type": "Node",
"label": "computer programming",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_programming"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/hacking/n/,/c/en/intelligent_agent_activity/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/intelligent_agent_activity/n",
"@type": "Node",
"label": "intelligent agent activity",
"language": "en",
"sense_label": "n",
"term": "/c/en/intelligent_agent_activity"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/ExternalURL/,/c/en/hacking/n/opencyc/hacking_coughing/,/http://sw.opencyc.org/2012/05/10/concept/en/Hacking_Coughing/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking_Coughing",
"@type": "Node",
"label": "Hacking Coughing",
"path": "/2012/05/10/concept/en/Hacking_Coughing",
"site": "sw.opencyc.org",
"site_available": false,
"term": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking_Coughing"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/ExternalURL",
"@type": "Relation",
"label": "ExternalURL"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/hacking/n/opencyc/hacking_coughing",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/shin/]",
"@type": "Edge",
"dataset": "/d/wiktionary/en",
"end": {
"@id": "/c/en/shin",
"@type": "Node",
"label": "shin",
"language": "en",
"term": "/c/en/shin"
},
"license": "cc:by-sa/4.0",
"rel": {
"@id": "/r/RelatedTo",
"@type": "Relation",
"label": "RelatedTo"
},
"sources": [
{
"@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
"@type": "Source",
"contributor": "/s/resource/wiktionary/en",
"process": "/s/process/wikiparsec/2"
}
],
"start": {
"@id": "/c/en/hacking/n/wikt/en_2",
"@type": "Node",
"label": "hacking",
"language": "en",
"sense_label": "n",
"term": "/c/en/hacking"
},
"surfaceText": null,
"weight": 1.0
}
],
"version": "5.8.1",
"view": {
"@id": "/c/en/hacking/n?offset=0&limit=20",
"@type": "PartialCollectionView",
"comment": "",
"firstPage": "/c/en/hacking/n?offset=0&limit=20",
"nextPage": "/c/en/hacking/n?offset=20&limit=20",
"paginatedProperty": "edges"
}
}