{
"@context": [
"http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
],
"@id": "/c/en/malicious_computer_program/n",
"edges": [
{
"@id": "/a/[/r/IsA/,/c/en/punter/n/opencyc/punter_computer_program/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/punter/n/opencyc/punter_computer_program",
"@type": "Node",
"label": "punter",
"language": "en",
"sense_label": "n",
"term": "/c/en/punter"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/malicious_computer_program/n/,/c/en/software_hack/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/software_hack/n",
"@type": "Node",
"label": "software hack",
"language": "en",
"sense_label": "n",
"term": "/c/en/software_hack"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/chat_room_backdoor/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/chat_room_backdoor/n",
"@type": "Node",
"label": "chat room backdoor",
"language": "en",
"sense_label": "n",
"term": "/c/en/chat_room_backdoor"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/computer_virus/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/computer_virus/n",
"@type": "Node",
"label": "computer virus",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_virus"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/worm/n/opencyc/computer_worm/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/worm/n/opencyc/computer_worm",
"@type": "Node",
"label": "worm",
"language": "en",
"sense_label": "n",
"term": "/c/en/worm"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/denial_of_service_program/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/denial_of_service_program/n",
"@type": "Node",
"label": "denial of service program",
"language": "en",
"sense_label": "n",
"term": "/c/en/denial_of_service_program"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/logic_bomb/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/logic_bomb/n",
"@type": "Node",
"label": "logic bomb",
"language": "en",
"sense_label": "n",
"term": "/c/en/logic_bomb"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/malicious_computer_program/n/,/c/en/application_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/application_program/n",
"@type": "Node",
"label": "application program",
"language": "en",
"sense_label": "n",
"term": "/c/en/application_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/ExternalURL/,/c/en/malicious_computer_program/n/,/http://sw.opencyc.org/2012/05/10/concept/en/MaliciousComputerProgram/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "http://sw.opencyc.org/2012/05/10/concept/en/MaliciousComputerProgram",
"@type": "Node",
"label": "MaliciousComputerProgram",
"path": "/2012/05/10/concept/en/MaliciousComputerProgram",
"site": "sw.opencyc.org",
"site_available": false,
"term": "http://sw.opencyc.org/2012/05/10/concept/en/MaliciousComputerProgram"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/ExternalURL",
"@type": "Relation",
"label": "ExternalURL"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/executable_exploit_code/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/executable_exploit_code/n",
"@type": "Node",
"label": "executable exploit code",
"language": "en",
"sense_label": "n",
"term": "/c/en/executable_exploit_code"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/trojan_horse/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/trojan_horse/n",
"@type": "Node",
"label": "trojan horse",
"language": "en",
"sense_label": "n",
"term": "/c/en/trojan_horse"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/malicious_remote_administration_program/n/,/c/en/malicious_computer_program/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/malicious_computer_program/n",
"@type": "Node",
"label": "malicious computer program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_computer_program"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/malicious_remote_administration_program/n",
"@type": "Node",
"label": "malicious remote administration program",
"language": "en",
"sense_label": "n",
"term": "/c/en/malicious_remote_administration_program"
},
"surfaceText": null,
"weight": 1.0
}
],
"version": "5.8.1"
}