Skip to search formSkip to main contentSkip to account menu

Uncontrolled format string

Known as: Format string bug, Uncontrolled, Format string attacks 
Uncontrolled format string is a type of software vulnerability discovered around 1989 that can be used in security exploits. Previously thought… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
There has been an upsurge recently in investigating machine learning techniques for activity recognition (AR) problems as they… 
Highly Cited
2007
Highly Cited
2007
High-quality cellulose multifilaments are spun using a preliminary pilot apparatus, from the cellulose dope in an NaOH and urea… 
Highly Cited
2003
Highly Cited
2003
Human activities create waste, and it is the way these wastes are handled, stored, collected and disposed of, which can pose… 
Highly Cited
2002
Highly Cited
2002
During recent decades, environmental conditions have deteriorated in the Black Sea. Population explosions of phytoplankton and… 
Highly Cited
1996
Highly Cited
1996
Software organizations need common milestones to serve as a basis for their software development processes. The author proposes… 
Highly Cited
1993
Highly Cited
1993
This series of working papers is intended to provide information and to generate fruitful discussion on key issues in the… 
Highly Cited
1990
Highly Cited
1990
Part 1 Basics: criticism and knowledge empirical study critical and conventional ethnography the critical tradition elements of… 
Highly Cited
1987
Highly Cited
1987
It is generally accepted that the formation of oil and gas from sedimentary organic matter—or kerogen—is adequately described by… 
Highly Cited
1975
Highly Cited
1975
  • E. Davison
  • 1975
  • Corpus ID: 39203144
A new notion of computer identification, as opposed to the conventional plant identification problem, is introduced in this paper…