{
  "@context": [
    "http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
  ],
  "@id": "/c/en/hacking/n",
  "edges": [
    {
      "@id": "/a/[/r/IsA/,/c/en/hacking/n/opencyc/penetrating_computer_network/,/c/en/computer_activity/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_activity/n",
        "@type": "Node",
        "label": "computer activity",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_activity"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/opencyc/penetrating_computer_network",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/american_football/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/american_football",
        "@type": "Node",
        "label": "american football",
        "language": "en",
        "term": "/c/en/american_football"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/HasContext",
        "@type": "Relation",
        "label": "HasContext"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/horseback/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/horseback",
        "@type": "Node",
        "label": "horseback",
        "language": "en",
        "term": "/c/en/horseback"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/RelatedTo",
        "@type": "Relation",
        "label": "RelatedTo"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/lisp_hacking/n/,/c/en/hacking/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/hacking/n",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/lisp_hacking/n",
        "@type": "Node",
        "label": "lisp hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/lisp_hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/hacking/n/opencyc/penetrating_computer_network/,/c/en/cracking/n/opencyc/cracking_compromising_security/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/cracking/n/opencyc/cracking_compromising_security",
        "@type": "Node",
        "label": "cracking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/cracking"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/opencyc/penetrating_computer_network",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/massage/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/massage",
        "@type": "Node",
        "label": "massage",
        "language": "en",
        "term": "/c/en/massage"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/HasContext",
        "@type": "Relation",
        "label": "HasContext"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/SimilarTo/,/c/en/hacking/n/,/c/fr/cybercrime/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/fr",
      "end": {
        "@id": "/c/fr/cybercrime",
        "@type": "Node",
        "label": "cybercrime",
        "language": "fr",
        "term": "/c/fr/cybercrime"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/SimilarTo",
        "@type": "Relation",
        "label": "SimilarTo"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/fr/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/fr",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/Synonym/,/c/en/hacking/n/wikt/en_2/,/c/fi/hakkerointi/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/fi/hakkerointi",
        "@type": "Node",
        "label": "hakkerointi",
        "language": "fi",
        "term": "/c/fi/hakkerointi"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/Synonym",
        "@type": "Relation",
        "label": "Synonym"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/ExternalURL/,/c/en/hacking/n/,/http://sw.opencyc.org/2012/05/10/concept/en/Hacking/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking",
        "@type": "Node",
        "label": "Hacking",
        "path": "/2012/05/10/concept/en/Hacking",
        "site": "sw.opencyc.org",
        "site_available": false,
        "term": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/ExternalURL",
        "@type": "Relation",
        "label": "ExternalURL"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/hacking/n/opencyc/hacking_coughing/,/c/en/cough/n/opencyc/coughing/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/cough/n/opencyc/coughing",
        "@type": "Node",
        "label": "cough",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/cough"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/opencyc/hacking_coughing",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/ExternalURL/,/c/en/hacking/n/opencyc/penetrating_computer_network/,/http://sw.opencyc.org/2012/05/10/concept/en/PenetratingAComputerNetwork/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "http://sw.opencyc.org/2012/05/10/concept/en/PenetratingAComputerNetwork",
        "@type": "Node",
        "label": "PenetratingAComputerNetwork",
        "path": "/2012/05/10/concept/en/PenetratingAComputerNetwork",
        "site": "sw.opencyc.org",
        "site_available": false,
        "term": "http://sw.opencyc.org/2012/05/10/concept/en/PenetratingAComputerNetwork"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/ExternalURL",
        "@type": "Relation",
        "label": "ExternalURL"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/opencyc/penetrating_computer_network",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/sports/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/sports",
        "@type": "Node",
        "label": "sports",
        "language": "en",
        "term": "/c/en/sports"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/HasContext",
        "@type": "Relation",
        "label": "HasContext"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/coughing/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/coughing",
        "@type": "Node",
        "label": "coughing",
        "language": "en",
        "term": "/c/en/coughing"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/RelatedTo",
        "@type": "Relation",
        "label": "RelatedTo"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/cracker/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/cracker",
        "@type": "Node",
        "label": "cracker",
        "language": "en",
        "term": "/c/en/cracker"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/RelatedTo",
        "@type": "Relation",
        "label": "RelatedTo"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/computing/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/computing",
        "@type": "Node",
        "label": "computing",
        "language": "en",
        "term": "/c/en/computing"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/HasContext",
        "@type": "Relation",
        "label": "HasContext"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/HasContext/,/c/en/hacking/n/wikt/en_2/,/c/en/soccer/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/soccer",
        "@type": "Node",
        "label": "soccer",
        "language": "en",
        "term": "/c/en/soccer"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/HasContext",
        "@type": "Relation",
        "label": "HasContext"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/hacking/n/,/c/en/computer_programming/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_programming/n",
        "@type": "Node",
        "label": "computer programming",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_programming"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/hacking/n/,/c/en/intelligent_agent_activity/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/intelligent_agent_activity/n",
        "@type": "Node",
        "label": "intelligent agent activity",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/intelligent_agent_activity"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/ExternalURL/,/c/en/hacking/n/opencyc/hacking_coughing/,/http://sw.opencyc.org/2012/05/10/concept/en/Hacking_Coughing/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking_Coughing",
        "@type": "Node",
        "label": "Hacking Coughing",
        "path": "/2012/05/10/concept/en/Hacking_Coughing",
        "site": "sw.opencyc.org",
        "site_available": false,
        "term": "http://sw.opencyc.org/2012/05/10/concept/en/Hacking_Coughing"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/ExternalURL",
        "@type": "Relation",
        "label": "ExternalURL"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/opencyc/hacking_coughing",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/RelatedTo/,/c/en/hacking/n/wikt/en_2/,/c/en/shin/]",
      "@type": "Edge",
      "dataset": "/d/wiktionary/en",
      "end": {
        "@id": "/c/en/shin",
        "@type": "Node",
        "label": "shin",
        "language": "en",
        "term": "/c/en/shin"
      },
      "license": "cc:by-sa/4.0",
      "rel": {
        "@id": "/r/RelatedTo",
        "@type": "Relation",
        "label": "RelatedTo"
      },
      "sources": [
        {
          "@id": "/and/[/s/process/wikiparsec/2/,/s/resource/wiktionary/en/]",
          "@type": "Source",
          "contributor": "/s/resource/wiktionary/en",
          "process": "/s/process/wikiparsec/2"
        }
      ],
      "start": {
        "@id": "/c/en/hacking/n/wikt/en_2",
        "@type": "Node",
        "label": "hacking",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/hacking"
      },
      "surfaceText": null,
      "weight": 1.0
    }
  ],
  "version": "5.8.1",
  "view": {
    "@id": "/c/en/hacking/n?offset=0&limit=20",
    "@type": "PartialCollectionView",
    "comment": "There are more results. Follow the 'nextPage' link for more.",
    "firstPage": "/c/en/hacking/n?offset=0&limit=20",
    "nextPage": "/c/en/hacking/n?offset=20&limit=20",
    "paginatedProperty": "edges"
  }
}