Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

File inclusion vulnerability

Known as: LFI, Local File Inclusion, Include vulnerability 
File inclusion vulnerability is a type of vulnerability most often found on websites. It allows an attacker to include a file, usually through a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Compared with conventional color images, light field images (LFIs) contain richer scene information, which allows a wide range of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The Planck High Frequency Instrument (HFI) is designed to measure the temperature and polarization anisotropies of the Cosmic… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present a system-level description of the Low Frequency Instrument (LFI) considered as a differencing polarimeter, and… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The LFI radiometers use a pseudo-correlation design where the signal from the sky is continuously compared with a stable… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The use of frequent itemsets has been limited by the high computational cost as well as the large number of resulting itemsets… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present an estimation of the point source (PS) catalogue that could be extracted from the forthcoming ESA Planck mission data… Expand
  • table 2
  • table 1
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We evaluated the effectiveness of isolation management and stocking to meet protection and en- hancement goals for native… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We implement an independent component analysis (ICA) algorithm to separate signals of different origin in sky maps at several… Expand
  • table 1
Is this relevant?
1993
1993
  • M. Roe
  • FSE
  • 1993
  • Corpus ID: 12970819
An alarmingly large number of different cryptosystems have been proposed for use with Internet Privacy Enhanced Mail [1]. These… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?