Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,563 papers from all fields of science
Search
Sign In
Create Free Account
Exploit (computer security)
Known as:
Remote exploits
, Programming exploit
, Security exploit
Expand
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Arbitrary code execution
Blackhole exploit kit
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Learning Multilingual Word Representations using a Bag-of-Words Autoencoder
Stanislas Lauly
,
A. Boulanger
,
H. Larochelle
arXiv.org
2014
Corpus ID: 13599696
Recent work on learning multilingual word representations usually relies on the use of word-level alignements (e.g. infered with…
Expand
2013
2013
Analyzing Semantic Segmentation Using Hybrid Human-Machine CRFs
Roozbeh Mottaghi
,
S. Fidler
,
Jian Yao
,
R. Urtasun
,
Devi Parikh
IEEE Conference on Computer Vision and Pattern…
2013
Corpus ID: 11576213
Recent trends in semantic image segmentation have pushed for holistic scene understanding models that jointly reason about…
Expand
Highly Cited
2008
Highly Cited
2008
Gambling loyalty schemes: treading a fine line?
Griffiths
,
R. Wood
2008
Corpus ID: 168382891
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in…
Expand
Review
2008
Review
2008
SCIENTIFIC HIGHLIGHT OF THE MONTH : ” Optical Properties of Correlated Materials – or Why Intelligent Windows may look Dirty ” Optical Properties of Correlated Materials – or Why Intelligent Windows…
J. M. Tomczak
,
S. Biermann
2008
Corpus ID: 6942417
Materials with strong electronic Coulomb correlations play an increasing role in modern materials applications. “Thermochromic…
Expand
Review
2007
Review
2007
The Knowledge Strategy Orientation Scale: Individual Perceptions of Firm-Level Phenomena
B. Miller
,
P. Bierly
,
P. Daly
2007
Corpus ID: 166841558
One of the most serious threats to the relatively new field of strategic management research is poor construct measurement (Boyd…
Expand
2004
2004
Gold/carbon composite tubes and gold nanowires by impregnating templates with hydrogen tetrachloroaurate/acetone solutions
P. Göring
,
E. Pippel
,
H. Hofmeister
,
R. Wehrspohn
,
M. Steinhart
,
U. Gösele
2004
Corpus ID: 98681419
Carbon/gold composite nanotubes as well as gold nanorods were synthesized by the impregnation of porous alumina with diluted…
Expand
2003
2003
A system-on-chip implementation of the IEEE 802.11a MAC layer
G. Panic
,
D. Dietterle
,
Z. Stamenkovic
,
K. Tittelbach-Helmrich
Euromicro Symposium on Digital System Design…
2003
Corpus ID: 12004482
This work presents an architectural solution for the IEEE 802.11a MAC layer on-chip implementation. The complete implementation…
Expand
2001
2001
C compiler design for a network processor
J. Wagner
,
R. Leupers
IEEE Trans. Comput. Aided Des. Integr. Circuits…
2001
Corpus ID: 19584809
One important problem in code generation for embedded processors is the design of efficient compilers for target machines with…
Expand
1992
1992
Pelagic fish : the resource and its exploitation
J. R. Burt
,
R. Hardy
,
K. Whittle
1992
Corpus ID: 204213436
Detailed accounts of global pelagic fish resources Ways in which they can be harvested Techniques used to handle the catch at sea…
Expand
Highly Cited
1990
Highly Cited
1990
Generating descriptions that exploit a user's domain knowledge
Ehud Reiter
1990
Corpus ID: 60383502