Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,264,611 papers from all fields of science
Search
Sign In
Create Free Account
Exploit (computer security)
Known as:
Remote exploits
, Programming exploit
, Security exploit
Expand
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Arbitrary code execution
Blackhole exploit kit
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Learning Multilingual Word Representations using a Bag-of-Words Autoencoder
Stanislas Lauly
,
A. Boulanger
,
H. Larochelle
arXiv.org
2014
Corpus ID: 13599696
Recent work on learning multilingual word representations usually relies on the use of word-level alignements (e.g. infered with…
Expand
2013
2013
Analyzing Semantic Segmentation Using Hybrid Human-Machine CRFs
Roozbeh Mottaghi
,
S. Fidler
,
Jian Yao
,
R. Urtasun
,
Devi Parikh
IEEE Conference on Computer Vision and Pattern…
2013
Corpus ID: 11576213
Recent trends in semantic image segmentation have pushed for holistic scene understanding models that jointly reason about…
Expand
Highly Cited
2008
Highly Cited
2008
Gambling loyalty schemes: treading a fine line?
Griffiths
,
R. Wood
2008
Corpus ID: 168382891
Loyalty and discount schemes in which customers are invited to sign up for a card and become a member of a scheme, sometimes in…
Expand
Review
2008
Review
2008
SCIENTIFIC HIGHLIGHT OF THE MONTH : ” Optical Properties of Correlated Materials – or Why Intelligent Windows may look Dirty ” Optical Properties of Correlated Materials – or Why Intelligent Windows…
J. M. Tomczak
,
S. Biermann
2008
Corpus ID: 6942417
Materials with strong electronic Coulomb correlations play an increasing role in modern materials applications. “Thermochromic…
Expand
Review
2007
Review
2007
The Knowledge Strategy Orientation Scale: Individual Perceptions of Firm-Level Phenomena
B. Miller
,
P. Bierly
,
P. Daly
2007
Corpus ID: 166841558
One of the most serious threats to the relatively new field of strategic management research is poor construct measurement (Boyd…
Expand
2004
2004
Gold/carbon composite tubes and gold nanowires by impregnating templates with hydrogen tetrachloroaurate/acetone solutions
P. Göring
,
E. Pippel
,
H. Hofmeister
,
R. Wehrspohn
,
M. Steinhart
,
U. Gösele
2004
Corpus ID: 98681419
Carbon/gold composite nanotubes as well as gold nanorods were synthesized by the impregnation of porous alumina with diluted…
Expand
2004
2004
The Grid Enterprise — Structuring the Agile Business of the Future
T. Boden
2004
Corpus ID: 57150666
Information technology (IT) spending remains depressed as organisations look to exploit their existing systems, squeezing out the…
Expand
2003
2003
A system-on-chip implementation of the IEEE 802.11a MAC layer
G. Panic
,
D. Dietterle
,
Z. Stamenkovic
,
K. Tittelbach-Helmrich
Euromicro Symposium on Digital System Design…
2003
Corpus ID: 12004482
This work presents an architectural solution for the IEEE 802.11a MAC layer on-chip implementation. The complete implementation…
Expand
Highly Cited
1990
Highly Cited
1990
Generating descriptions that exploit a user's domain knowledge
Ehud Reiter
1990
Corpus ID: 60383502
1988
1988
Evolution of Animal Behavior. Paleontological and Field Approaches
C. Beer
,
M. H. Nitecki
,
J. A. Kitchell
1988
Corpus ID: 41600656
INTRODUCTION Jennifer A Kitchell & Matthew H Nitecki: Evolution and behaviour HISTORICAL APPROACHES TO THE EVOLUTION OF BEHAVIOUR…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE