Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,182,833 papers from all fields of science
Search
Sign In
Create Free Account
Directory traversal attack
Known as:
Directory traversal
, Path traversal
, Path traversal vulnerability
A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Chroot
Computer file
DOS
Double encoding
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Data Freshness Based AUV Path Planning for UWSN in the Internet of Underwater Things
Muhammad Toaha Raza Khan
,
Yalew Zelalem Jembre
,
Syed Hassan Ahmed
,
Junho Seo
,
Dongkyun Kim
Global Communications Conference
2019
Corpus ID: 211680492
In Underwater Wireless Sensor Networks (UWSN), Autonomous Underwater Vehicles (AUVs), which are responsible to collect(deliver…
Expand
2014
2014
6D proximity servoing for preshaping and haptic exploration using capacitive tactile proximity sensors
S. E. Navarro
,
Martin Schonert
,
B. Hein
,
H. Wörn
IEEE/RSJ International Conference on Intelligent…
2014
Corpus ID: 18370388
In this paper we present applications for a robot system whose gripper is equipped with distributed capacitive tactile proximity…
Expand
Highly Cited
2011
Highly Cited
2011
Mining Web navigation patterns with a path traversal graph
Yao-Te Wang
,
Anthony J. T. Lee
Expert systems with applications
2011
Corpus ID: 11895317
Highly Cited
2010
Highly Cited
2010
VisiNav: A system for visual search and navigation on web data
A. Harth
Journal of Web Semantics
2010
Corpus ID: 15629950
2009
2009
A sliding window method for finding top-k path traversal patterns over streaming Web click-sequences
Hua-Fu Li
Expert systems with applications
2009
Corpus ID: 30571797
1999
1999
A Practical Approach to Validating and Testing Software Systems Using Scenarios
J. Ryser
,
M. Glinz
1999
Corpus ID: 11226623
Scenarios (Use cases) are a means to capture a system’s functionality and behavior in a user-centered perspective. Thus they are…
Expand
1999
1999
Experiments with a steady hand robot in constrained compliant motion and path following
Rajesh Kumar
,
P. Jensen
,
R. Taylor
8th IEEE International Workshop on Robot and…
1999
Corpus ID: 14879242
We consider the problem of cooperative manipulation to improve positioning and path following abilities of humans. Using a…
Expand
Highly Cited
1996
Highly Cited
1996
Data mining for path traversal patterns in a web environment
Ming-Syan Chen
,
Jong Soo Park
,
Philip S. Yu
Proceedings of 16th International Conference on…
1996
Corpus ID: 62023742
In this paper, we explore a new data mining capability which involved mining path traversal patterns in a distributed information…
Expand
1990
1990
Minimum-time trajectories for two robots holding the same workpiece
J. Bobrow
,
J. McCarthy
,
V. K. Chu
IEEE Conference on Decision and Control
1990
Corpus ID: 62073248
The authors present an algorithm which minimizes the time for two robots holding the same workpiece to move along a given path…
Expand
Highly Cited
1989
Highly Cited
1989
Navigational path planning for a vision-based mobile robot
R. Arkin
Robotica (Cambridge. Print)
1989
Corpus ID: 38900138
SUMMARY The Autonomous Robot Architecture (AuRA) provides multi-level representation and planning capabilities. This paper…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE