Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,788,133 papers from all fields of science
Search
Sign In
Create Free Account
Exploit (computer security)
Known as:
Remote exploits
, Programming exploit
, Security exploit
Expand
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Arbitrary code execution
Blackhole exploit kit
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Learning-based coexistence for LTE operation in unlicensed bands
O. Sallent
,
J. Pérez-Romero
,
R. Ferrús
,
R. Agustí
IEEE International Conference on Communication…
2015
Corpus ID: 2849642
The use of Long Term Evolution (LTE) in the unlicensed 5 GHz band, referred to as LTE-U, is a promising enhancement to increase…
Expand
2014
2014
Low-latency wireless 3D NoCs via randomized shortcut chips
Hiroki Matsutani
,
M. Koibuchi
,
+6 authors
H. Amano
Design, Automation and Test in Europe
2014
Corpus ID: 16903329
In this paper, we demonstrate that we can reduce the communication latency significantly by inserting a fraction of randomness…
Expand
Highly Cited
2008
Highly Cited
2008
Gambling loyalty schemes: treading a fine line?
Griffiths
,
R. Wood
2008
Corpus ID: 168382891
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in…
Expand
Review
2007
Review
2007
The Knowledge Strategy Orientation Scale: Individual Perceptions of Firm-Level Phenomena
B. Miller
,
P. Bierly
,
P. Daly
2007
Corpus ID: 166841558
One of the most serious threats to the relatively new field of strategic management research is poor construct measurement (Boyd…
Expand
Highly Cited
2006
Highly Cited
2006
Spectrum Characterization for Opportunistic Cognitive Radio Systems
Tevfik Yiicek
,
Hiiseyin Arslan
IEEE Military Communications Conference
2006
Corpus ID: 14476376
Spectrum sensing is one of the most challenging problems in cognitive radio systems. The spectrum of interest needs to be…
Expand
Highly Cited
2005
Highly Cited
2005
Evolving Hardware by Dynamically Reconfiguring Xilinx FPGAs
A. Upegui
,
Eduardo Sanchez Ecole
2005
Corpus ID: 14125432
Evolvable Hardware arises as a promising solution for automatic digital synthesis of digital and analog circuits. During the last…
Expand
Highly Cited
1993
Highly Cited
1993
An algorithmic approach to the optimization of importance sampling parameters in digital communication system simulation
M. Devetsikiotis
,
Keith Townsend
IEEE Transactions on Communications
1993
Corpus ID: 206405769
Importance sampling is recognized as a potentially powerful method for reducing simulation runtimes when estimating the bit error…
Expand
Highly Cited
1989
Highly Cited
1989
Test generation for highly sequential circuits
Abhijit Ghosh
,
S. Devadas
,
A. Newton
IEEE International Conference on Computer-Aided…
1989
Corpus ID: 24458685
The authors address the problem of generating test sequences for stuck-at faults in nonscan synchronous sequential circuits. They…
Expand
Highly Cited
1973
Highly Cited
1973
Children's television;: The economics of exploitation
W. Melody
,
Action for Children's Television
1973
Corpus ID: 152687697
Review
1967
Review
1967
To Whom Much Has Been Given...
M. O. Rouse
1967
Corpus ID: 72589360
There is no doubt in my mind that, when I review the outstanding memories collected during a lifetime in the medical profession…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required