File inclusion vulnerability

Known as: LFI, Local File Inclusion, Include vulnerability 
File inclusion vulnerability is a type of vulnerability most often found on websites. It allows an attacker to include a file, usually through a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Big data is an evolving data set that describes any voluminous amount of structured, semi-structured and unstructured data and is… (More)
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper proposes a combination of low- and high-frequency hybrid active power filter (APF) to operate in parallel for better… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of general-purpose software… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We design a new, implementable capital requirement for large financial institutions (LFIs) that are “too big to fail”. Our… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The use of frequent itemsets has been limited by the high computational cost as well as the large number of resulting itemsets… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
  • H. G. Robledo
  • Electronics, Robotics and Automotive Mechanics…
  • 2008
Web server attacks are increasingly in short time for different purposes, one of the principal vectors of this attacks are RFI… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2008
2008
We present an estimation of the point source (PS) catalogue that could be extracted from the forthcoming ESA Planck mission data… (More)
  • table 2
  • table 1
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
2007
2007
Directed diffusion (DD) is a data-centric routing protocol based on purely local interactions between individual network nodes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We evaluated the effectiveness of isolation management and stocking to meet protection and enhancement goals for native Colorado… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?