Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Recognizing lines of unconstrained handwritten text is a challenging task. The difficulty of segmenting cursive or overlapping… (More)
  • figure 1
  • figure 4
  • figure 3
  • figure 5
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Exploration and exploitation have emerged as the twin concepts underpinning organizational adaptation research, yet some central… (More)
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We develop a contingency view of process management's influence on both technological innovation and organizational adaptation… (More)
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Although research on trust in an organizational context has advanced considerably in recent years, the literature has yet to… (More)
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
While the recent focus on knowledge has undoubtedly benefited organizational studies, the literature still presents a sharply… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Reusable ontologies are becoming increasingly important for tasks such as information integration, knowledge-level interoperation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1993
Highly Cited
1993
We present a new algorithm for finding the global minimum of a multivariate function subject to simple bounds. The algorithm is a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
1991
Highly Cited
1991
Kuipers, B. and Byun, Y.T., A robot exploration and mapping strategy based on a semantic hierarchy of spatial representations… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?