Skip to search formSkip to main contentSkip to account menu

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Recent work on learning multilingual word representations usually relies on the use of word-level alignements (e.g. infered with… 
2013
2013
Recent trends in semantic image segmentation have pushed for holistic scene understanding models that jointly reason about… 
Highly Cited
2008
Highly Cited
2008
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in… 
Review
2008
Review
2008
Materials with strong electronic Coulomb correlations play an increasing role in modern materials applications. “Thermochromic… 
Review
2007
Review
2007
One of the most serious threats to the relatively new field of strategic management research is poor construct measurement (Boyd… 
2004
2004
Carbon/gold composite nanotubes as well as gold nanorods were synthesized by the impregnation of porous alumina with diluted… 
2004
2004
Information technology (IT) spending remains depressed as organisations look to exploit their existing systems, squeezing out the… 
2003
2003
This work presents an architectural solution for the IEEE 802.11a MAC layer on-chip implementation. The complete implementation… 
Highly Cited
1990
1988
1988
INTRODUCTION Jennifer A Kitchell & Matthew H Nitecki: Evolution and behaviour HISTORICAL APPROACHES TO THE EVOLUTION OF BEHAVIOUR…