Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Abstract This tutorial introduces the reader to Gaussian process regression as an expressive tool to model, actively explore and… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2018
Review
2018
Cellulose has attracted considerable attention as the strongest potential candidate feedstock for bio-based polymeric material… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 1
Is this relevant?
Review
2017
Review
2017
The Human-induced Earthquake Database, HiQuake, is a comprehensive record of earthquake sequences postulated to be induced by… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
This work proposes a new meta-heuristic called Grey Wolf Optimizer (GWO) inspired by grey wolves (Canis lupus). The GWO algorithm… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
There are new system implementation challenges involved in the design of cognitive radios, which have both the ability to sense… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We develop a contingency view of process management's influence on both technological innovation and organizational adaptation… Expand
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
While the recent focus on knowledge has undoubtedly benefited organizational studies, the literature still presents a sharply… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
One of the major applications of data mining is in helping companies determine which potential customers to market to. If the… Expand
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Software development projects can be fun, productive, and even daring. Yet they can consistently deliver value to a business and… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1987
Highly Cited
1987
  • D. Denning
  • IEEE Transactions on Software Engineering
  • 1987
  • Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
Is this relevant?