Directory traversal attack

Known as: Directory traversal, Path traversal, Path traversal vulnerability 
A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1987-2018
05101519872018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
In recent decades, mapping has been increasingly investigated and applied in unmanned terrain, aerial, sea, and underwater… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
A novel approach based on particle swarm optimization has been presented in this paper for solving mobile robot navigation task… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2011
2011
As mobile operating systems reach the same level of complexity of computer operating systems, these may be affected by the same… (More)
Is this relevant?
2007
2007
Scenarios are an important mechanism for requirements specification and can be used to generate test paths at the requirements… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
High-level semantic vulnerabilities such as SQL injection and crosssite scripting have surpassed buffer overflows as the most… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present new O(n)-time methods for planar embedding and Kuratowski subgraph isolation that were inspired by the Booth-Lueker PQ… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2003
2003
Effective and efficient test data generation is one of the major challenging and time-consuming tasks within the software testing… (More)
  • table 1
  • figure 1
  • figure 4
  • figure 3
Is this relevant?
1999
1999
Scenarios (Use cases) are used to describe the functionality and behavior of a (software) system in a user-centered perspective… (More)
  • figure 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In this paper, we explore a new data mining capability that involves mining path traversal patterns in a distributed information… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1996
Highly Cited
1996
In this paper, we explore a new data mining capability which involves mining path traversal patterns in a distributed information… (More)
Is this relevant?