Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,442,660 papers from all fields of science
Search
Sign In
Create Free Account
Arbitrary code execution
Known as:
Arbitrary code
, RCE
, Remote code execution
In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Adobe Flash
Adobe Flash Player
Bash
Branch (computer science)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
ОЦЕНКА ЧАСТОТЫ ПОСЛЕОПЕРАЦИОННЫХ ОСЛОЖНЕНИЙ И ВОЗМОЖНОСТИ ИХ СНИЖЕНИЯ У ПАЦИЕНТОВ ПРИ ПРОВЕДЕНИИ РАДИКАЛЬНОЙ ЦИСТЭКТОМИИ: ВЗГЛЯД ТЕРАПЕВТА И ХИРУРГА
Д. П. Котова
,
Сергей Владиславович Котов
,
А. Л. Хачатрян
,
В. С. Шеменкова
2018
Corpus ID: 227474540
The aim of study: to estimate the frequency of postoperative complications and the ways of their reduction in patients after…
Expand
2017
2017
ОНКОЛОГИЧЕСКИЕ РЕЗУЛЬТАТЫ ПЕРВИЧНОЙ, СПАСИТЕЛЬНОЙ И ПАЛЛИАТИВНОЙ ЦИСТЭКТОМИИ ПРИ РАКЕ МОЧЕВОГО ПУЗЫРЯ
О. Н. Васильев
,
М. И. Коган
,
В. А. Перепечай
2017
Corpus ID: 78867380
I ntroduction . Modern studies show an impressive 5-year absence of pelvic recurrence in 80% to 90% of cases and a 5-year overall…
Expand
2016
2016
Self-configurable FPGA-based computer systems: basics and proof of concept
V. Melnyk
2016
Corpus ID: 164439291
Computer systems performance is today improved with two major approaches: general-purpose computer computing power increase…
Expand
2014
2014
Security System for Healthcare Data in Cloud Computing
M. Louk
,
Hyotaek Lim
,
Hoon-Jae Lee
2014
Corpus ID: 61367077
Cloud computing is a renowned computing method of sharing data resources whether publicly or privately. Cloud computing is an…
Expand
2012
2012
Why move? How weight and discourse factors combine to predict relative clause extraposition in English
Elaine Francis
,
Laura A. Michaelis
2012
Corpus ID: 11850740
In relative clause extraposition (RCE) in English, a subject-modifying relative clause is displaced to a position following the…
Expand
2012
2012
Dynamic Overflow Vulnerability Detection Method Based on Finite CSP
Chen Kai
2012
Corpus ID: 63724307
Overflow vulnerability is one of the most dangerous vulnerability types.Attackers can make use of this vulnerability to execute…
Expand
2010
2010
Attack Vectors through the Eyes of Software-based Fault Isolation
Mathias Payer
2010
Corpus ID: 16806798
Exploits are an interesting way to extend the functionality of programs. This paper presents and explains different attack…
Expand
1999
1999
T-User Code with Arbitrary Code Length for Multiple-Access Adder Channel (Special Section on Information Theory and Its Applications)
Jun Cheng
,
Y. Watanabe
1999
Corpus ID: 60183560
1990
1990
A keyword spotter which incorporates neural networks for secondary processing
D. Morgan
,
C. Scofield
,
T. M. Lorenzo
,
E. Real
,
D. P. Loconto
IEEE International Conference on Acoustics…
1990
Corpus ID: 57333874
Experiments using restricted Coulomb energy (RCE) and backward error propagation trained artificial neural networks (ANNs) for…
Expand
1978
1978
Optimum Weighted PCM for Speech Signals
C. Sundberg
IEEE Transactions on Communications
1978
Corpus ID: 62152896
Weighted digital modulation schemes which provide bit error probabilities matched to the PCM bits with respect to their…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE