Skip to search formSkip to main contentSkip to account menu

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Recent work on learning multilingual word representations usually relies on the use of word-level alignements (e.g. infered with… 
2013
2013
Recent trends in semantic image segmentation have pushed for holistic scene understanding models that jointly reason about… 
Highly Cited
2008
Highly Cited
2008
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in… 
Review
2008
Review
2008
Materials with strong electronic Coulomb correlations play an increasing role in modern materials applications. “Thermochromic… 
Review
2007
Review
2007
One of the most serious threats to the relatively new field of strategic management research is poor construct measurement (Boyd… 
2004
2004
Carbon/gold composite nanotubes as well as gold nanorods were synthesized by the impregnation of porous alumina with diluted… 
2003
2003
This work presents an architectural solution for the IEEE 802.11a MAC layer on-chip implementation. The complete implementation… 
2001
2001
One important problem in code generation for embedded processors is the design of efficient compilers for target machines with… 
1992
1992
Detailed accounts of global pelagic fish resources Ways in which they can be harvested Techniques used to handle the catch at sea… 
Highly Cited
1990