Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,160,431 papers from all fields of science
Search
Sign In
Create Free Account
Exploit (computer security)
Known as:
Remote exploits
, Programming exploit
, Security exploit
Expand
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Arbitrary code execution
Blackhole exploit kit
Botnet
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Learning-based coexistence for LTE operation in unlicensed bands
O. Sallent
,
J. Pérez-Romero
,
R. Ferrús
,
R. Agustí
IEEE International Conference on Communication…
2015
Corpus ID: 2849642
The use of Long Term Evolution (LTE) in the unlicensed 5 GHz band, referred to as LTE-U, is a promising enhancement to increase…
Expand
Highly Cited
2007
Highly Cited
2007
Optimal Electrical Distribution Systems Reinforcement Planning Using Gas Micro Turbines by Dynamic Ant Colony Search Algorithm
S. Favuzza
,
Giorgio Graditi
,
M. Ippolito
,
E. R. Sanseverino
IEEE Transactions on Power Systems
2007
Corpus ID: 23946891
Distribution systems management is becoming an increasingly complicated issue due to the introduction of new energy trading…
Expand
Highly Cited
2006
Highly Cited
2006
Spectrum Characterization for Opportunistic Cognitive Radio Systems
Tevfik Yiicek
,
Hiiseyin Arslan
IEEE Military Communications Conference
2006
Corpus ID: 14476376
Spectrum sensing is one of the most challenging problems in cognitive radio systems. The spectrum of interest needs to be…
Expand
Highly Cited
2006
Highly Cited
2006
Modelling an exploited marine fish community with 15 parameters - results from a simple size-based model
J. Pope
,
J. Rice
,
N. Daan
,
S. Jennings
,
H. Gislason
2006
Corpus ID: 86348490
Highly Cited
2005
Highly Cited
2005
Waste picker cooperatives in developing countries
M. Medina
2005
Corpus ID: 37136579
The informal recovery of materials from waste represents an important survival strategy for disadvantaged populations throughout…
Expand
Highly Cited
2002
Highly Cited
2002
The genetics and conservation of Araucaria angustifolia: I. Genetic structure and diversity of natural populations by means of non-adaptive variation in the state of Santa Catarina, Brazil
Neiva Maria Frizon Auler
,
M. S. Reis
,
M. P. Guerra
,
R. Nodari
2002
Corpus ID: 10893642
The objective of this study was to generate information relative to the allele distribution and dynamics within and among…
Expand
Highly Cited
2002
Highly Cited
2002
A generic fuzzy rule based image segmentation algorithm
G. Karmakar
,
L. Dooley
Pattern Recognition Letters
2002
Corpus ID: 38372010
Highly Cited
1998
Highly Cited
1998
Improved genetic operators for structural engineering optimization
J. Leite
,
B. Topping
1998
Corpus ID: 62727523
Highly Cited
1996
Highly Cited
1996
Software Diversity: Practical Statistics for Its Measurement and Exploitation | Draft Currently under Revision
W. Krzanowski
,
D. Partridge
1996
Corpus ID: 1829111
The topic of this paper is the exploitation of diversity to enhance computer system reliability. It is well-established that a…
Expand
Review
1967
Review
1967
To Whom Much Has Been Given...
M. O. Rouse
1967
Corpus ID: 72589360
There is no doubt in my mind that, when I review the outstanding memories collected during a lifetime in the medical profession…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required