Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,430,052 papers from all fields of science
Search
Sign In
Create Free Account
Exploit (computer security)
Known as:
Remote exploits
, Programming exploit
, Security exploit
Expand
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Arbitrary code execution
Blackhole exploit kit
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Hiring Stars and Their Colleagues: Exploration and Exploitation in Professional Service Firms
Boris Groysberg
,
Linda-Eling Lee
Organ. Sci.
2009
Corpus ID: 6668679
This paper examines exploration and exploitation in professional service firms by focusing on the individuals who carry out the…
Expand
Highly Cited
2009
Highly Cited
2009
How top management team behavioral integration and behavioral complexity enable organizational ambidexterity: The moderating role of contextual ambidexterity
A. Carmeli
,
Meyrav Yitzack Halevi
2009
Corpus ID: 28597896
Highly Cited
2007
Highly Cited
2007
An Inside Look at Botnets
P. Barford
,
V. Yegneswaran
Malware Detection
2007
Corpus ID: 2131334
The continued growth and diversification of the Internet has been accompanied by an increasing prevalence of attacks and…
Expand
Highly Cited
2006
Highly Cited
2006
Minimum-cost network hardening using attack graphs
Lingyu Wang
,
S. Noel
,
S. Jajodia
Computer Communications
2006
Corpus ID: 4375791
Highly Cited
2005
Highly Cited
2005
Satellite Tracking and Analysis Tool (STAT): an integrated system for archiving, analyzing and mapping animal tracking data
M. Coyne
,
B. Godley
2005
Corpus ID: 84603922
Despite the obvious power and advan- tages of the Argos system to track animals by satellite, the data generated are difficult…
Expand
Highly Cited
2004
Highly Cited
2004
Coral reef cascades and the indirect effects of predator removal by exploitation
N. Dulvy
,
R. Freckleton
,
N. Polunin
2004
Corpus ID: 59519129
Fisheries exploitation provides the opportunity to examine the ecosystem-scale biodiversity consequences of predator removal. We…
Expand
Highly Cited
2002
Highly Cited
2002
New service development: areas for exploitation and exploration
L. J. Menor
,
Mohan V. Tatikonda
,
Scott E. Sampson
2002
Corpus ID: 18883027
Highly Cited
2002
Highly Cited
2002
Experimental verification of backward-wave radiation from a negative refractive index metamaterial
A. Grbic
,
G. Eleftheriades
2002
Corpus ID: 55867036
A composite medium consisting of an array of fine wires and split-ring resonators has been previously used to experimentally…
Expand
Highly Cited
1999
Highly Cited
1999
Matrix habitat and species richness in tropical forest remnants
C. Gascon
,
T. Lovejoy
,
+7 authors
S. Borges
1999
Corpus ID: 67778808
Review
1977
Review
1977
Incompatibility in angiosperms
D. Nettancourt
Sexual Plant Reproduction
1977
Corpus ID: 23235221
Since Darwinian times considerable knowledge has accumulated on the distribution, physiology and genetics of self…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE