Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,508,470 papers from all fields of science
Search
Sign In
Create Free Account
Exploit (computer security)
Known as:
Remote exploits
, Programming exploit
, Security exploit
Expand
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Arbitrary code execution
Blackhole exploit kit
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Learning-based coexistence for LTE operation in unlicensed bands
O. Sallent
,
J. Pérez-Romero
,
R. Ferrús
,
R. Agustí
IEEE International Conference on Communication…
2015
Corpus ID: 2849642
The use of Long Term Evolution (LTE) in the unlicensed 5 GHz band, referred to as LTE-U, is a promising enhancement to increase…
Expand
Highly Cited
2008
Highly Cited
2008
Gambling loyalty schemes: treading a fine line?
Griffiths
,
R. Wood
2008
Corpus ID: 168382891
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in…
Expand
Highly Cited
2006
Highly Cited
2006
Spectrum Characterization for Opportunistic Cognitive Radio Systems
Tevfik Yiicek
,
Hiiseyin Arslan
IEEE Military Communications Conference
2006
Corpus ID: 14476376
Spectrum sensing is one of the most challenging problems in cognitive radio systems. The spectrum of interest needs to be…
Expand
Highly Cited
2005
Highly Cited
2005
Evolving Hardware by Dynamically Reconfiguring Xilinx FPGAs
A. Upegui
,
Eduardo Sanchez Ecole
2005
Corpus ID: 14125432
Evolvable Hardware arises as a promising solution for automatic digital synthesis of digital and analog circuits. During the last…
Expand
Highly Cited
2002
Highly Cited
2002
A generic fuzzy rule based image segmentation algorithm
G. Karmakar
,
L. Dooley
Pattern Recognition Letters
2002
Corpus ID: 38372010
Highly Cited
2001
Highly Cited
2001
Rural Migrants and Patriarchy in Turkish Cities
T. Erman
2001
Corpus ID: 53621295
This article investigates patriarchy in the context of migration to cities in Turkey. It focuses on the ways in which patriarchy…
Expand
Highly Cited
2000
Highly Cited
2000
CLIS-TR-0001 May 2000 Using Implicit Feedback for User Modeling in Internet and Intranet Searching φ
Jinmook Kim
,
Douglas W. Oard
,
Kathleen Romanik
2000
Corpus ID: 17551593
Powerize Server 1.0, developed by Powerize.com, is a content-based information filtering and retrieval system that presently uses…
Expand
Highly Cited
1993
Highly Cited
1993
An algorithmic approach to the optimization of importance sampling parameters in digital communication system simulation
M. Devetsikiotis
,
Keith Townsend
IEEE Transactions on Communications
1993
Corpus ID: 206405769
Importance sampling is recognized as a potentially powerful method for reducing simulation runtimes when estimating the bit error…
Expand
Highly Cited
1989
Highly Cited
1989
Test generation for highly sequential circuits
Abhijit Ghosh
,
S. Devadas
,
A. Newton
IEEE International Conference on Computer-Aided…
1989
Corpus ID: 24458685
The authors address the problem of generating test sequences for stuck-at faults in nonscan synchronous sequential circuits. They…
Expand
Review
1967
Review
1967
To Whom Much Has Been Given...
M. O. Rouse
1967
Corpus ID: 72589360
There is no doubt in my mind that, when I review the outstanding memories collected during a lifetime in the medical profession…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE