Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

POODLE

Known as: CVE-2014-3566, Poodle attack, Padding Oracle On Downgraded Legacy Encryption 
The POODLE attack (which stands for "Padding Oracle On Downgraded Legacy Encryption") is a man-in-the-middle exploit which takes advantage of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Projective content is utterance content that a speaker may be taken to be committed to even when the expression associated with… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
2015
2015
One of the main characteristics of Smart TVs are apps. Apps extend the Smart TV behavior with various functionalities, ranging… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
2014
2014
This paper proposes a new autonomous self-organizing content-based node clustering peer to peer Information Retrieval (P2PIR… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
2014
2014
The effect of various “range” of dilution, temperature and pH on T4 bacteriophage lytic activity against Escherichia coli had… Expand
  • table 1
2014
2014
We present new methods for pruning and enhancing itemsets for text classification via association rule mining. Pruning methods… Expand
  • figure 1
  • table 1
  • table 3
  • figure 2
2011
2011
Recent research demonstrates that both real-time variability in perceptual input and task demands influence young children’s word… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Highly Cited
2003
Highly Cited
2003
  • A. Sy
  • 2003
  • Corpus ID: 153880582
In contrast to the early-warning system literature, we find that currency and debt crises are not closely linked in emerging… Expand
  • table 1
  • table 2
  • table 3
  • table 5
  • table 6
Highly Cited
2002
Highly Cited
2002
Abstract Four studies examined the prediction of construal level theory that the more distant future events would be construed in… Expand
  • figure 1
  • figure 2
Highly Cited
1996
Highly Cited
1996
It is often desirable to predict or constrain the lexical choices people make with spoken language systems. I discuss lexical… Expand
  • figure 1
  • figure 2
Highly Cited
1984
Highly Cited
1984
This article examines theories that assume that semantic networks account for the mental representation of meaning. It assesses… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6