Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
GNSS-dependent positioning, navigation, and timing synchronization procedures have a significant impact on everyday life. Thus… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2015
Highly Cited
2015
The process of learning good features for machine learning applications can be very computationally expensive and may prove… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We present a novel data structure, the Bayes tree, that provides an algorithmic foundation enabling a better understanding of… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Recognizing lines of unconstrained handwritten text is a challenging task. The difficulty of segmenting cursive or overlapping… (More)
  • figure 1
  • figure 4
  • figure 3
  • figure 5
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • Sakari M. Uppala, Per Kallberg, +43 authors John S. Woollen
  • 2005
By S. M. UPPALA1, P. W. KÅLLBERG1, A. J. SIMMONS1∗, U. ANDRAE1, V. DA COSTA BECHTOLD1, M. FIORINO2, J. K. GIBSON1, J. HASELER1, A… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well as high-profile… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Organization and strategy research has stressed the need for organizations to simultaneously exploit existing capabilities while… (More)
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
I intend to keep a collection of links at the book’s web page, http://www.rossanderson.com. Please check out this page if a link… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
From the standpoint of supporting human-centered discovery of knowledge, the present-day model of mining association rules… (More)
  • figure 1
  • figure 3
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?