Skip to search formSkip to main contentSkip to account menu

Exploit (computer security)

Known as: Remote exploits, Programming exploit, Security exploit 
An exploit (from the English verb to exploit, meaning "using something to one’s own advantage") is a piece of software, a chunk of data, or a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
This paper examines exploration and exploitation in professional service firms by focusing on the individuals who carry out the… 
Highly Cited
2007
Highly Cited
2007
The continued growth and diversification of the Internet has been accompanied by an increasing prevalence of attacks and… 
Highly Cited
2005
Highly Cited
2005
Despite the obvious power and advan- tages of the Argos system to track animals by satellite, the data generated are difficult… 
Highly Cited
2004
Highly Cited
2004
Fisheries exploitation provides the opportunity to examine the ecosystem-scale biodiversity consequences of predator removal. We… 
Highly Cited
2002
Highly Cited
2002
A composite medium consisting of an array of fine wires and split-ring resonators has been previously used to experimentally… 
Highly Cited
1999
Review
1977
Review
1977
 Since Darwinian times considerable knowledge has accumulated on the distribution, physiology and genetics of self…