memory corruption
Automating and Simplifying Memory Corruption Attack Response Using Failure-Aware Computing
61
Address Space Layout Permutation: Increasing Resistance to Memory Corruption Attacks
79
Importance Of Penetration Testing For Legacy Operating System
5
Non-Control-Data Attacks Are Realistic Threats
15
XNU: a security evaluation
89
Trustworthy Software Systems
41
The law, corruption and reinvestment decisions : the transitional periphery in comparative context
38
Some things are rarely discussed in public – on the discourse of corruption in healthcare; comment on “we need to talk about corruption in health systems”
8
Mihály Fazekas* - István János Tóth**
49
Assessing the Effects of Corruption and Crime on Firm Performance: Evidence from Latin America
36
State capacity; drivers of corruption and anti corruption interventions: conceptualising corruption in Indian context a rational choice approach
8
The Challenges Of Curbing Corruption In A Democracy: The Nigeria Experience
8
The relationship between corruption and public investment at the municipalities’ level in Indonesia
8
Introduction to Corruption
7
CORRUPTION IN INDIAN GOVERNANCE
6
Crime and conflicts in Africa: consequences of corruption?
15
The Root and Governance of Land Corruption from the Perspective of Behavioristics: Based on the Analysis of Four Typical Cases
15
The silence of corruption : identifying underreporting of business corruption through randomized response techniques
36
Corruption in the Caribbean
11
The impacts of corruption on firm performance: some lessons from 40 African countries
20