Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,324 papers from all fields of science
Search
Sign In
Create Free Account
Inter-protocol exploitation
Known as:
Inter-protocol communication
, Inter-protocol exploits
, Cross-protocol scripting
Expand
Inter-protocol exploitation is a class of security vulnerabilities that takes advantage of interactions between two communication protocols, for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
BMP file format
Encapsulation (networking)
Exploit (computer security)
Firewall (computing)
Expand
Broader (3)
Computer security
E-commerce
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Impact of using additives on quality of agricultural biomass pellets
I. Găgeanu
,
D. Cujbescu
,
C. Persu
,
G. Voicu
2018
Corpus ID: 54794922
The benefits of biofuels, compared to traditional fuels, target higher energy security, lower environmental impact, financial…
Expand
Review
2016
Review
2016
Socio-economic differentials in intergenerational educational mobility among women in India
Akanksha Choudhary
,
A. Singh
2016
Corpus ID: 133076451
A few studies have related daughters’ education to their fathers in India but there is little to no evidence when it comes to…
Expand
2014
2014
Innovating on Interdomain Routing with an Inter-SDN Component
Ricardo Bennesby
,
E. Mota
,
P. Fonseca
,
A. Passito
IEEE 28th International Conference on Advanced…
2014
Corpus ID: 17776298
The Internet's interdomain routing architecture has undergone only minor changes since its inception. It presents issues…
Expand
2012
2012
Energy-aware multiperiod traffic engineering with flow-based routing
B. Addis
,
A. Capone
,
G. Carello
,
L. Gianoli
,
B. Sansò
IEEE International Conference on Communications…
2012
Corpus ID: 8618989
We propose a multi-period model to minimize the energy consumption of IP networks while guaranteeing the satisfaction of all the…
Expand
Review
2012
Review
2012
Fiscal federalism and income redistribution through healthcare financing: An empirical analysis for the Swiss cantons
L. Crivelli
,
P. Salari
2012
Corpus ID: 37006859
Previous studies have viewed Swiss health-care financing as particularly regressive. However, as the OECD Review of the Swiss…
Expand
2010
2010
Governance architectures for inter-organisational R&D collaboration
B. Clegg
,
Mario Binder
,
Simon Chandler
,
J. Edwards
2010
Corpus ID: 18757315
Inter-organizational relationships are becoming an increasingly important source of competitive advantage and innovation. This…
Expand
2004
2004
The Vulnerability Concept and its Application to Food Security
P. Lucas
,
H. Hilderink
2004
Corpus ID: 146803303
This report describes an operationalisation of the term ‘sustainable development’, by introducing the vulnerability concept…
Expand
Highly Cited
2003
Highly Cited
2003
Access to What? Converting Educational Opportunity into Employment Opportunity
J. Brennan
,
Tarla Shah
2003
Corpus ID: 155652563
2003
2003
Simulation of a bid-based dispatch subject to inter-zonal transmission constraints
A. Berizzi
,
C. Bovo
,
M. Delfanti
,
E. Fumagalli
,
M. Merlo
IEEE Bologna Power Tech Conference Proceedings,
2003
Corpus ID: 154396275
The opening of a power exchange in Italy is expected for early 2004. Among the market rules, the system operator established that…
Expand
1997
1997
Application-layer group communication server for extending reliable multicast protocols services
E. Al-Shaer
,
H. Abdel-Wahab
,
K. Maly
Proceedings International Conference on Network…
1997
Corpus ID: 8252077
Reliable multicast protocols are becoming an essential element in distributed applications such as interactive distance learning…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE