See Byzantine attack on Wiktionary
{ "forms": [ { "form": "Byzantine attacks", "tags": [ "plural" ] } ], "head_templates": [ { "args": {}, "expansion": "Byzantine attack (plural Byzantine attacks)", "name": "en-noun" } ], "lang": "English", "lang_code": "en", "pos": "noun", "senses": [ { "categories": [ { "kind": "other", "name": "English entries with incorrect language header", "parents": [ "Entries with incorrect language header", "Entry maintenance" ], "source": "w" }, { "kind": "other", "name": "Pages with 1 entry", "parents": [], "source": "w" }, { "kind": "other", "name": "Pages with entries", "parents": [], "source": "w" }, { "kind": "topical", "langcode": "en", "name": "Computer security", "orig": "en:Computer security", "parents": [ "Computing", "Technology", "All topics", "Fundamental" ], "source": "w" } ], "examples": [ { "ref": "2005, Jie Wu, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, CRC Press, →ISBN, page 835:", "text": "Finally, the Byzantine attack raises the problem of reaching a consensus among nodes when an unknown number of them maybe traitors.", "type": "quote" }, { "ref": "2010, Yang Xiao, Underwater Acoustic Sensor Networks, CRC Press, →ISBN, page 125:", "text": "Four main Byzantine attacks include “Black Holes,” “Flood Rushing,” “Wormholes,” and “Overlay Network Wormholes” [10].", "type": "quote" } ], "glosses": [ "A type of attack involving multiple nodes collaborating to disrupt the network." ], "id": "en-Byzantine_attack-en-noun-txYwHqwK", "links": [ [ "computer security", "computer security" ], [ "node", "node" ], [ "network", "network" ] ], "qualifier": "computer security", "raw_glosses": [ "(computer security) A type of attack involving multiple nodes collaborating to disrupt the network." ] } ], "word": "Byzantine attack" }
{ "forms": [ { "form": "Byzantine attacks", "tags": [ "plural" ] } ], "head_templates": [ { "args": {}, "expansion": "Byzantine attack (plural Byzantine attacks)", "name": "en-noun" } ], "lang": "English", "lang_code": "en", "pos": "noun", "senses": [ { "categories": [ "English countable nouns", "English entries with incorrect language header", "English lemmas", "English multiword terms", "English nouns", "English terms with quotations", "Pages with 1 entry", "Pages with entries", "en:Computer security" ], "examples": [ { "ref": "2005, Jie Wu, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks, CRC Press, →ISBN, page 835:", "text": "Finally, the Byzantine attack raises the problem of reaching a consensus among nodes when an unknown number of them maybe traitors.", "type": "quote" }, { "ref": "2010, Yang Xiao, Underwater Acoustic Sensor Networks, CRC Press, →ISBN, page 125:", "text": "Four main Byzantine attacks include “Black Holes,” “Flood Rushing,” “Wormholes,” and “Overlay Network Wormholes” [10].", "type": "quote" } ], "glosses": [ "A type of attack involving multiple nodes collaborating to disrupt the network." ], "links": [ [ "computer security", "computer security" ], [ "node", "node" ], [ "network", "network" ] ], "qualifier": "computer security", "raw_glosses": [ "(computer security) A type of attack involving multiple nodes collaborating to disrupt the network." ] } ], "word": "Byzantine attack" }
Download raw JSONL data for Byzantine attack meaning in All languages combined (1.4kB)
This page is a part of the kaikki.org machine-readable All languages combined dictionary. This dictionary is based on structured data extracted on 2025-01-15 from the enwiktionary dump dated 2025-01-01 using wiktextract (b941637 and 4230888). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.
If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.