Skip to search formSkip to main contentSkip to account menu

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
The use of Long Term Evolution (LTE) in the unlicensed 5 GHz band, referred to as LTE-U, is a promising enhancement to increase… 
Highly Cited
2007
Highly Cited
2007
Distribution systems management is becoming an increasingly complicated issue due to the introduction of new energy trading… 
Highly Cited
2006
Highly Cited
2006
Spectrum sensing is one of the most challenging problems in cognitive radio systems. The spectrum of interest needs to be… 
Highly Cited
2005
Highly Cited
2005
The informal recovery of materials from waste represents an important survival strategy for disadvantaged populations throughout… 
Highly Cited
2002
Highly Cited
2002
The objective of this study was to generate information relative to the allele distribution and dynamics within and among… 
Highly Cited
1998
Highly Cited
1996
Highly Cited
1996
The topic of this paper is the exploitation of diversity to enhance computer system reliability. It is well-established that a… 
Review
1967
Review
1967
There is no doubt in my mind that, when I review the outstanding memories collected during a lifetime in the medical profession…