Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,386,602 papers from all fields of science
Search
Sign In
Create Free Account
Exploit kit
Known as:
Exploit kits
An exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Backdoor (computing)
Blackhole exploit kit
Botnet
Client (computing)
Expand
Broader (1)
Spyware
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A systematic mapping on security threats in mobile devices
Anselmo Lacerda
,
R. D. de Queiroz
,
M. Barbosa
Information Theory and Applications Workshop
2015
Corpus ID: 14041040
The increase in the use of mobile devices and the large amount of sensitive information that they store make them valuable…
Expand
2014
2014
Investors’ Reaction to the Implementation of Corporate Governance Mechanisms
N. Bhutta
,
S. Shah
2014
Corpus ID: 36534324
The study investigates the impact of corporate governance on investor reaction. This is the first study till date that addresses…
Expand
2014
2014
PExy: The Other Side of Exploit Kits
G. Maio
,
A. Kapravelos
,
Yan Shoshitaishvili
,
Christopher Krügel
,
Giovanni Vigna
International Conference on Detection of…
2014
Corpus ID: 7510089
The drive-by download scene has changed dramatically in the last few years. What was a disorganized ad-hoc generation of…
Expand
2014
2014
WebWinnow: leveraging exploit kit workflows to detect malicious urls
Birhanu Eshete
,
V. Venkatakrishnan
Conference on Data and Application Security and…
2014
Corpus ID: 15360625
Organized cybercrime on the Internet is proliferating due to exploit kits. Attacks launched through these kits include drive-by…
Expand
2013
2013
A Stackelberg Game Approach for Secure and Efficient Surveillance
G. Chaudhary
,
Y. Narahari
2013
Corpus ID: 62552936
Review
2012
Review
2012
State of Web Exploit Kits
jason. jones
2012
Corpus ID: 12873968
Web exploit toolkits have become the most popular method for cybercriminals to compromise hosts and to leverage those hosts for…
Expand
2012
2012
Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses
Kevin Z. Snow
,
F. Monrose
2012
Corpus ID: 10054729
Document-based code injection attacks, where-in malicious code (coined shellcode) is embedded in a document, have quickly…
Expand
2008
2008
Probability of Attack Based on System Vulnerability Life Cycle
Amontip Jumratjaroenvanit
,
Yunyong Teng-Amnuay
International Symposium on Electronic Commerce…
2008
Corpus ID: 8067861
The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on…
Expand
2006
2006
Rivals or partners? Evidence from Europe's international private equity deals
A. Schertler
,
Tereza Tykvová
2006
Corpus ID: 36810037
Cross-border private equity deals have increased substantially in recent years. This study looks at the issue of how European…
Expand
Review
2001
Review
2001
REDESIGN OF INTRODUCTORY COURSE IN ELECTRICAL AND COMPUTER ENGINEERING AT STAVANGER UNIVERSITY COLLEGE
J. Odegard
,
K. Engan
,
T. O. Gulsrud
,
A. Rettedal
2001
Corpus ID: 16223358
This paper discuss the process involved in redesigning the curriculum in the Electrical and Computer Engineering department at…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE