Skip to search formSkip to main contentSkip to account menu

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
The use of Long Term Evolution (LTE) in the unlicensed 5 GHz band, referred to as LTE-U, is a promising enhancement to increase… 
Highly Cited
2008
Highly Cited
2008
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in… 
Highly Cited
2006
Highly Cited
2006
Spectrum sensing is one of the most challenging problems in cognitive radio systems. The spectrum of interest needs to be… 
Highly Cited
2005
Highly Cited
2005
Evolvable Hardware arises as a promising solution for automatic digital synthesis of digital and analog circuits. During the last… 
Highly Cited
2001
Highly Cited
2001
This article investigates patriarchy in the context of migration to cities in Turkey. It focuses on the ways in which patriarchy… 
Highly Cited
2000
Highly Cited
2000
Powerize Server 1.0, developed by Powerize.com, is a content-based information filtering and retrieval system that presently uses… 
Highly Cited
1993
Highly Cited
1993
Importance sampling is recognized as a potentially powerful method for reducing simulation runtimes when estimating the bit error… 
Highly Cited
1989
Highly Cited
1989
The authors address the problem of generating test sequences for stuck-at faults in nonscan synchronous sequential circuits. They… 
Review
1967
Review
1967
There is no doubt in my mind that, when I review the outstanding memories collected during a lifetime in the medical profession…