Skip to search formSkip to main contentSkip to account menu

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
The use of Long Term Evolution (LTE) in the unlicensed 5 GHz band, referred to as LTE-U, is a promising enhancement to increase… 
Highly Cited
2007
Highly Cited
2007
Distribution systems management is becoming an increasingly complicated issue due to the introduction of new energy trading… 
Highly Cited
2006
Highly Cited
2006
Spectrum sensing is one of the most challenging problems in cognitive radio systems. The spectrum of interest needs to be… 
Highly Cited
2005
Highly Cited
2005
Evolvable Hardware arises as a promising solution for automatic digital synthesis of digital and analog circuits. During the last… 
Highly Cited
2002
Highly Cited
2002
The objective of this study was to generate information relative to the allele distribution and dynamics within and among… 
Highly Cited
2000
Highly Cited
2000
Powerize Server 1.0, developed by Powerize.com, is a content-based information filtering and retrieval system that presently uses… 
Highly Cited
1998
Review
1967
Review
1967
There is no doubt in my mind that, when I review the outstanding memories collected during a lifetime in the medical profession…