Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,389,629 papers from all fields of science
Search
Sign In
Create Free Account
Capture the flag
Known as:
Capture the flag (disambiguation)
, Bannercatch
, CTF
Expand
Capture the flag, commonly abbreviated as CTF, is a traditional outdoor game where two teams each have a flag (or other marker) and the objective is…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Artificial intelligence
Blog
Computer security
Duke Nukem 3D
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Capture the Flag as Cyber Security Introduction
L. McDaniel
,
Erik Talvi
,
Bria N Hay
Hawaii International Conference on System…
2016
Corpus ID: 35062822
Introducing technical concepts to students with little to no technical background can be a challenging task for any teacher to…
Expand
Highly Cited
2015
Highly Cited
2015
Automation-Assisted Capture-the-Flag: A Differential Game Approach
Haomiao Huang
,
Jerry Ding
,
Wei Zhang
,
C. Tomlin
IEEE Transactions on Control Systems Technology
2015
Corpus ID: 13563599
Capture-the-flag is a complex, challenging game that is a useful proxy for many problems in robotics and other application areas…
Expand
2015
2015
Capture the Flag
2015
Corpus ID: 61856805
Submit a single file called assignment5.zip to cuLearn. There are 100 marks possible marks. The assignment it out of 100. This…
Expand
2015
2015
Automatic Problem Generation for Capture-the-Flag Competitions
Jonathan Burket
,
Peter Chapman
,
T. Becker
,
Christopher Ganas
,
David Brumley
2015
Corpus ID: 45030830
Computer security games, especially capture-the-flag (CTF) competitions, are growing in popularity. A typical CTF contest…
Expand
2015
2015
Reimagining Internet Geographies: A User-Centric Ethnological Mapping of the World Wide Web
A. Wu
,
H. Taneja
J. Comput. Mediat. Commun.
2015
Corpus ID: 18406767
We propose a new user-centric imagery of the WWW that foregrounds local usage and its shaping forces, in contrast to existing…
Expand
Highly Cited
2014
Highly Cited
2014
Class Capture-the-Flag Exercises
J. Mirkovic
,
Peter A. H. Peterson
3GSE
2014
Corpus ID: 8999320
The field of cybersecurity is adversarial – the real challenge lies in outsmarting motivated and knowledgeable human attackers…
Expand
2014
2014
X-ray phase contrast tomography from whole organ down to single cells
M. Krenkel
,
M. Töpperwien
,
M. Bartels
,
P. Lingor
,
D. Schild
,
T. Salditt
Optics & Photonics - Optical Engineering…
2014
Corpus ID: 54199259
We use propagation based hard x-ray phase contrast tomography to explore the three dimensional structure of neuronal tissues from…
Expand
2009
2009
Overfishing of Three Siganid Species (Family: Siganidae) in Lagonoy Gulf, Philippines
V. Soliman
,
R. U. Bobiles
,
K. Yamaoka
2009
Corpus ID: 73551612
Juvenile and older Siganus canaliculatus, S. spinus and S. argenteus were assessed in Lagonoy Gulf from analysis of total…
Expand
2004
2004
Capture-the-Flag: Learning Computer Security Under Fire
C. Eagle
,
John L. D. Clark
2004
Corpus ID: 492931
Abstract : In this paper, we describe the Capture-the-Flag (CTF) activity and argue that it contributes to a necessary component…
Expand
2001
2001
A radical approach to handwritten Chinese character recognition using active handwriting models
D. Shi
,
S. Gunn
,
R. Damper
Proceedings of the IEEE Computer Society…
2001
Corpus ID: 6235141
This paper applies active handwriting models (AHM) to handwritten Chinese character recognition. Exploiting active shape models…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE