Skip to search formSkip to main contentSkip to account menu

Directory traversal attack

Known as: Directory traversal, Path traversal, Path traversal vulnerability 
A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
In Underwater Wireless Sensor Networks (UWSN), Autonomous Underwater Vehicles (AUVs), which are responsible to collect(deliver… 
2014
2014
In this paper we present applications for a robot system whose gripper is equipped with distributed capacitive tactile proximity… 
1999
1999
Scenarios (Use cases) are a means to capture a system’s functionality and behavior in a user-centered perspective. Thus they are… 
1999
1999
We consider the problem of cooperative manipulation to improve positioning and path following abilities of humans. Using a… 
Highly Cited
1996
Highly Cited
1996
In this paper, we explore a new data mining capability which involved mining path traversal patterns in a distributed information… 
1990
1990
The authors present an algorithm which minimizes the time for two robots holding the same workpiece to move along a given path… 
Highly Cited
1989
Highly Cited
1989
SUMMARY The Autonomous Robot Architecture (AuRA) provides multi-level representation and planning capabilities. This paper…