Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,223,302 papers from all fields of science
Search
Sign In
Create Free Account
Armitage
Known as:
Armitage (disambiguation)
Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits. It is a free and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Computer security
Java
Kali Linux
Metasploit
Expand
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The evolution of local participation and the mode of knowledge production in Arctic research
Nicolas D. Brunet
,
G. Hickey
,
M. Humphries
2014
Corpus ID: 36015957
Arctic science is often claimed to have been transformed by the increased involvement of local people, but these claims of a new…
Expand
Highly Cited
2012
Highly Cited
2012
Spatial Fit, from Panacea to Practice: Implementing the EU Water Framework Directive
T. Moss
2012
Corpus ID: 2122559
Within the broad discourse on the concept of fit and its relevance for the governance of social–ecological systems, problems of…
Expand
Highly Cited
2011
Highly Cited
2011
Social learning: a knowledge and capacity building approach for adaptive co-management of contested landscapes
A. J. Leys
,
J. Vanclay
2011
Corpus ID: 49226676
Highly Cited
2009
Highly Cited
2009
FORMATION OF THE TERRESTRIAL PLANETS FROM A NARROW ANNULUS
B. Hansen
2009
Corpus ID: 14226690
We show that the assembly of the solar system terrestrial planets can be successfully modeled with all of the mass initially…
Expand
Review
2008
Review
2008
The Growth Mechanisms of Macroscopic Bodies in Protoplanetary Disks
J. Blum
,
G. Wurm
2008
Corpus ID: 54586031
The formation of planetesimals, the kilometer-sized planetary precursors, is still a puzzling process. Considerable progress has…
Expand
Highly Cited
2007
Highly Cited
2007
A Machine Learning Approach for Efficient Traffic Classification
Wei Li
,
A. Moore
15th International Symposium on Modeling…
2007
Corpus ID: 2037709
Traffic classification is of fundamental importance to track the evolution of network applications and model their behaviours…
Expand
Highly Cited
2004
Highly Cited
2004
Job search and the theory of planned behavior: Minority–majority group differences in The Netherlands
E. V. Hooft
,
M. Born
,
T. Taris
,
H. V. D. Flier
2004
Corpus ID: 54071674
Highly Cited
2003
Highly Cited
2003
Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action
S. Bamberg
,
I. Ajzen
,
P. Schmidt
2003
Corpus ID: 145180925
Relying on the theory of planned behavior (Ajzen, 1991), a longitudinal study investigated the effects of an intervention…
Expand
Highly Cited
1984
Highly Cited
1984
Investment and relatedness: A cost/benefit analysis of breeding and helping in the pied kingfisher (Ceryle rudis)
H. Reyer
Animal Behaviour
1984
Corpus ID: 53202094
Highly Cited
1980
Highly Cited
1980
Mate preferences of female mottled sculpins, Cottus bairdi
J. Downhower
,
L. Brown
Animal Behaviour
1980
Corpus ID: 53174384
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE