diff --git a/index.html b/index.html
index 46cc1fd..2838bb1 100644
--- a/index.html
+++ b/index.html
@@ -185,7 +185,7 @@
@@ -1850,6 +1850,7 @@ In Proc. of: Free and Open Communications on the Internet
+
@@ -1884,7 +1885,7 @@ Advancing the Art of Censorship Data Analysis
-
+
@@ -1912,7 +1913,7 @@ Global, Passive Detection of Connection Tampering
-
+
@@ -1970,7 +1971,7 @@ Network Measurement Methods for Locating and Examining Censorship Devices
-
+
@@ -1998,7 +1999,7 @@ TSPU: Russia’s Decentralized Censorship System
-
+
@@ -2026,7 +2027,7 @@ Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship Measurement
-
+
@@ -2054,7 +2055,7 @@ GET /out: Automated Discovery of Application-Layer Censorship Evasion Strategies
-
+
@@ -2082,7 +2083,7 @@ OpenVPN is Open to VPN Fingerprinting
-
+
@@ -2111,7 +2112,7 @@ Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet
-
+
@@ -2139,7 +2140,7 @@ COVID-19 increased censorship circumvention and access to sensitive topics in Ch
-
+
@@ -2167,7 +2168,7 @@ Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet
-
+
@@ -2225,7 +2226,7 @@ OUStralopithecus: Overt User Simulation for Censorship Circumvention
-
+
@@ -2253,7 +2254,7 @@ Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels
-
+
@@ -2281,7 +2282,7 @@ Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
-
+
@@ -2310,7 +2311,7 @@ Meteor: Cryptographically Secure Steganography for Realistic Distributions
-
+
@@ -2338,7 +2339,7 @@ Throttling Twitter: an emerging censorship technique in Russia
-
+
@@ -2367,7 +2368,7 @@ Web censorship measurements of HTTP/3 over QUIC
-
+
@@ -2395,7 +2396,7 @@ Measuring DoT/DoH blocking using OONI Probe: a preliminary study
-
+
@@ -2423,7 +2424,7 @@ A multi-perspective view of Internet censorship in Myanmar
-
+
@@ -2451,7 +2452,7 @@ Measuring QQMail’s Automated Email Censorship in China
-
+
@@ -2480,7 +2481,7 @@ Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
-
+
@@ -2508,7 +2509,7 @@ Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middlebo
-
+
@@ -2537,7 +2538,7 @@ BlindTLS: Circumventing TLS-Based HTTPS Censorship
-
+
@@ -2566,7 +2567,7 @@ Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resis
-
+
@@ -2594,7 +2595,7 @@ Weaponizing Middleboxes for TCP Reflected Amplification
-
+
@@ -2622,7 +2623,7 @@ How Great is the Great Firewall? Measuring China’s DNS Censorship
-
+
@@ -2651,7 +2652,7 @@ Balboa: Bobbing and Weaving around Network Censorship
-
+
@@ -2679,7 +2680,7 @@ Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability
-
+
@@ -2708,7 +2709,7 @@ Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs
-
+
@@ -2739,7 +2740,7 @@ Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert C
-
+
@@ -2768,7 +2769,7 @@ Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communication
-
+
@@ -2797,7 +2798,7 @@ Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
-
+
@@ -2825,7 +2826,7 @@ How China Detects and Blocks Shadowsocks
-
+
@@ -2854,7 +2855,7 @@ Investigating Large Scale HTTPS Interception in Kazakhstan
-
+
@@ -2882,7 +2883,7 @@ Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side E
-
+
@@ -2910,7 +2911,7 @@ MIMIQ: Masking IPs with Migration in QUIC
-
+
@@ -2939,7 +2940,7 @@ Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Ar
-
+
@@ -2968,7 +2969,7 @@ Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
-
+
@@ -2997,7 +2998,7 @@ Slitheen++: Stealth TLS-based Decoy Routing
-
+
@@ -3026,7 +3027,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil
-
+
@@ -3054,7 +3055,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols
-
+
@@ -3083,7 +3084,7 @@ HTTPT: A Probe-Resistant Proxy
-
+
@@ -3111,7 +3112,7 @@ How India Censors the Web
-
+
@@ -3140,7 +3141,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch
-
+
@@ -3169,7 +3170,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System
-
+
@@ -3198,7 +3199,7 @@ Running Refraction Networking for Real
-
+
@@ -3227,7 +3228,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie
-
+
@@ -3256,7 +3257,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
-
+
@@ -3285,7 +3286,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco
-
+
@@ -3314,7 +3315,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
-
+
@@ -3343,7 +3344,7 @@ Detecting Probe-resistant Proxies
-
+
@@ -3372,7 +3373,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale
-
+
@@ -3401,7 +3402,7 @@ Decentralized Control: A Case Study of Russia
-
+
@@ -3429,7 +3430,7 @@ Protocol Proxy: An FTE-based covert channel
-
+
@@ -3460,7 +3461,7 @@ Conjure: Summoning Proxies from Unused Address Space
-
+
@@ -3489,7 +3490,7 @@ Geneva: Evolving Censorship Evasion Strategies
-
+
@@ -3517,7 +3518,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico
-
+
@@ -3545,7 +3546,7 @@ Shedding Light on Mobile App Store Censorship
-
+
@@ -3574,7 +3575,7 @@ Improving Meek With Adversarial Techniques
-
+
@@ -3603,7 +3604,7 @@ On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
-
+
@@ -3631,7 +3632,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat
-
+
@@ -3660,7 +3661,7 @@ Measuring I2P Censorship at a Global Scale
-
+
@@ -3688,7 +3689,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
-
+
@@ -3717,7 +3718,7 @@ The use of TLS in Censorship Circumvention
-
+
@@ -3747,7 +3748,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce
-
+
@@ -3775,7 +3776,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
-
+
@@ -3803,7 +3804,7 @@ In Proc. of: Internet Measurement Conference, 2018, A
-
+
@@ -3831,7 +3832,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
-
+
@@ -3860,7 +3861,7 @@ Secure asymmetry and deployability for decoy routing systems
-
+
@@ -3889,7 +3890,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning
-
+
@@ -3918,7 +3919,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship
-
+
@@ -3946,7 +3947,7 @@ Incentivizing Censorship Measurements via Circumvention
-
+
@@ -3975,7 +3976,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges
-
+
@@ -4004,7 +4005,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
-
+
@@ -4032,7 +4033,7 @@ An analysis of automatic image filtering on WeChat Moments
-
+
@@ -4060,7 +4061,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
-
+
@@ -4088,7 +4089,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China
-
+
@@ -4116,7 +4117,7 @@ How Sudden Censorship Can Increase Access to Information
-
+
@@ -4144,7 +4145,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study
-
+
@@ -4172,7 +4173,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers
-
+
@@ -4202,7 +4203,7 @@ The Devil’s in The Details: Placing Decoy Routers in the Internet
-
+
@@ -4230,7 +4231,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage
-
+
@@ -4258,7 +4259,7 @@ The Random Forest based Detection of Shadowsock’s Traffic
-
+
@@ -4286,7 +4287,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor
-
+
@@ -4314,7 +4315,7 @@ Mending Wall: On the Implementation of Censorship in India
-
+
@@ -4342,7 +4343,7 @@ Online Advertising under Internet Censorship
-
+
@@ -4370,7 +4371,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling
-
+
@@ -4398,7 +4399,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
-
+
@@ -4426,7 +4427,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and
-
+
@@ -4454,7 +4455,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac
-
+
@@ -4482,7 +4483,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
-
+
@@ -4510,7 +4511,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid
-
+
@@ -4538,7 +4539,7 @@ When the Internet Goes Down in Bangladesh
-
+
@@ -4566,7 +4567,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking
-
+
@@ -4594,7 +4595,7 @@ Global Measurement of DNS Manipulation
-
+
@@ -4622,7 +4623,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL
-
+
@@ -4650,7 +4651,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
-
+
@@ -4678,7 +4679,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the
-
+
@@ -4707,7 +4708,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices
-
+
@@ -4735,7 +4736,7 @@ An ISP-Scale Deployment of TapDance
-
+
@@ -4763,7 +4764,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video
-
+
@@ -4791,7 +4792,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists
-
+
@@ -4819,7 +4820,7 @@ A Usability Evaluation of Tor Launcher
-
+
@@ -4847,7 +4848,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions
-
+
@@ -4875,7 +4876,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
-
+
@@ -4903,7 +4904,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats
-
+
@@ -4931,7 +4932,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras
-
+
@@ -4961,7 +4962,7 @@ Fingerprintability of WebRTC
-
+
@@ -4989,7 +4990,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
-
+
@@ -5017,7 +5018,7 @@ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
-
+
@@ -5045,7 +5046,7 @@ Game of Decoys: Optimal Decoy Routing Through Game Theory
-
+
@@ -5073,7 +5074,7 @@ Practical Censorship Evasion Leveraging Content Delivery Networks
-
+
@@ -5101,7 +5102,7 @@ DNS-sly: Avoiding Censorship through Network Complexity
-
+
@@ -5129,7 +5130,7 @@ Matryoshka: Hiding Secret Communication in Plain Sight
-
+
@@ -5157,7 +5158,7 @@ GhostPost: Seamless Restoration of Censored Social Media Posts
-
+
@@ -5185,7 +5186,7 @@ Censors’ Delay in Blocking Circumvention Proxies
-
+
@@ -5213,7 +5214,7 @@ The Politics of Routing: Investigating the Relationship Between AS Connectivity
-
+
@@ -5241,7 +5242,7 @@ A Framework for the Game-theoretic Analysis of Censorship Resistance
-
+
@@ -5269,7 +5270,7 @@ SoK: Making Sense of Censorship Resistance Systems
-
+
@@ -5298,7 +5299,7 @@ Salmon: Robust Proxy Distribution for Censorship Circumvention
-
+
@@ -5326,7 +5327,7 @@ Satellite: Joint Analysis of CDNs and Network-Level Interference
-
+
@@ -5354,7 +5355,7 @@ Analyzing Internet Censorship in Pakistan
-
+
@@ -5382,7 +5383,7 @@ Leveraging Internet Services to Evade Censorship
-
+
@@ -5410,7 +5411,7 @@ Games Without Frontiers: Investigating Video Games as a Covert Channel
-
+
@@ -5438,7 +5439,7 @@ Mailet: Instant Social Networking under Censorship
-
+
@@ -5466,7 +5467,7 @@ CovertCast: Using Live Streaming to Evade Internet Censorship
-
+
@@ -5494,7 +5495,7 @@ SkypeLine: Robust Hidden Data Transmission for VoIP
-
+
@@ -5522,7 +5523,7 @@ Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regi
-
+
@@ -5550,7 +5551,7 @@ SoK: Towards Grounding Censorship Circumvention in Empiricism
-
+
@@ -5580,7 +5581,7 @@ Alibi Routing
-
+
@@ -5608,7 +5609,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
-
+
@@ -5636,7 +5637,7 @@ Rebound: Decoy Routing on Asymmetric Routes Via Error Messages
-
+
@@ -5664,7 +5665,7 @@ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homopho
-
+
@@ -5692,7 +5693,7 @@ A Case for Marrying Censorship Measurements with Circumvention
-
+
@@ -5720,7 +5721,7 @@ Can Censorship Measurements Be Safe(r)?
-
+
@@ -5748,7 +5749,7 @@ Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Pl
-
+
@@ -5776,7 +5777,7 @@ Known Unknowns: An Analysis of Twitter Censorship in Turkey
-
+
@@ -5805,7 +5806,7 @@ Examining How the Great Firewall Discovers Hidden Circumvention Servers
-
+
@@ -5833,7 +5834,7 @@ CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
-
+
@@ -5861,7 +5862,7 @@ Seeing through Network-Protocol Obfuscation
-
+
@@ -5889,7 +5890,7 @@ Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet
-
+
@@ -5917,7 +5918,7 @@ Understanding Internet Censorship Policy: The Case of Greece
-
+
@@ -5945,7 +5946,7 @@ Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms
-
+
@@ -5973,7 +5974,7 @@ An Analysis of China’s “Great Cannon”
-
+
@@ -6001,7 +6002,7 @@ Marionette: A Programmable Network-Traffic Obfuscation System
-
+
@@ -6029,7 +6030,7 @@ Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
-
+
@@ -6057,7 +6058,7 @@ Ethical Concerns for Censorship Measurement
-
+
@@ -6085,7 +6086,7 @@ Analyzing the Great Firewall of China Over Space and Time
-
+
@@ -6113,7 +6114,7 @@ Blocking-resistant communication through domain fronting
-
+
@@ -6141,7 +6142,7 @@ Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative
-
+
@@ -6169,7 +6170,7 @@ Internet Censorship detection: A survey
-
+
@@ -6197,7 +6198,7 @@ Monitoring Internet Censorship with UBICA
-
+
@@ -6227,7 +6228,7 @@ GoHop: Personal VPN to Defend from Censorship
-
+
@@ -6255,7 +6256,7 @@ Global Network Interference Detection over the RIPE Atlas Network
-
+
@@ -6283,7 +6284,7 @@ Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship
-
+
@@ -6311,7 +6312,7 @@ CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
-
+
@@ -6339,7 +6340,7 @@ Censorship in the Wild: Analyzing Internet Filtering in Syria
-
+
@@ -6367,7 +6368,7 @@ TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
-
+
@@ -6395,7 +6396,7 @@ Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
-
+
@@ -6423,7 +6424,7 @@ No Direction Home: The True Cost of Routing Around Decoys
-
+
@@ -6451,7 +6452,7 @@ Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
-
+
@@ -6479,7 +6480,7 @@ Automated Detection and Fingerprinting of Censorship Block Pages
-
+
@@ -6507,7 +6508,7 @@ A Look at the Consequences of Internet Censorship Through an ISP Lens
-
+
@@ -6535,7 +6536,7 @@ Reverse-engineering censorship in China: Randomized experimentation and particip
-
+
@@ -6563,7 +6564,7 @@ Facet: Streaming over Videoconferencing for Censorship Circumvention
-
+
@@ -6591,7 +6592,7 @@ LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes
-
+
@@ -6619,7 +6620,7 @@ Toward automatic censorship detection in microblogs
-
+
@@ -6647,7 +6648,7 @@ VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance
-
+
@@ -6675,7 +6676,7 @@ Measuring Freenet in the Wild: Censorship-resilience under Observation
-
+
@@ -6703,7 +6704,7 @@ Censorship Resistance as a Side-Effect
-
+
@@ -6731,7 +6732,7 @@ A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
-
+
@@ -6759,7 +6760,7 @@ TapDance: End-to-Middle Anticensorship without Flow Blocking
-
+
@@ -6789,7 +6790,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi
-
+
@@ -6817,7 +6818,7 @@ Self-Censorship on Facebook
-
+
@@ -6845,7 +6846,7 @@ Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran
-
+
@@ -6874,7 +6875,7 @@ Internet Censorship in Iran: A First Look
-
+
@@ -6902,7 +6903,7 @@ Gaining Insight into AS-level Outages through Analysis of Internet Background Ra
-
+
@@ -6930,7 +6931,7 @@ Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on S
-
+
@@ -6958,7 +6959,7 @@ A Method for Identifying and Confirming the Use of URL Filtering Products for Ce
-
+
@@ -6986,7 +6987,7 @@ Revealing Middlebox Interference with Tracebox
-
+
@@ -7014,7 +7015,7 @@ Protocol Misidentification Made Easy with Format-Transforming Encryption
-
+
@@ -7042,7 +7043,7 @@ OSS: Using Online Scanning Services for Censorship Circumvention
-
+
@@ -7070,7 +7071,7 @@ Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
-
+
@@ -7098,7 +7099,7 @@ Building Dissent Networks: Towards Effective Countermeasures against Large-Scale
-
+
@@ -7126,7 +7127,7 @@ I want my voice to be heard: IP over Voice-over-IP for unobservable censorship c
-
+
@@ -7155,7 +7156,7 @@ The Parrot is Dead: Observing Unobservable Network Communications
-
+
@@ -7183,7 +7184,7 @@ Message In A Bottle: Sailing Past Censorship
-
+
@@ -7211,7 +7212,7 @@ Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion
-
+
@@ -7239,7 +7240,7 @@ The Anatomy of Web Censorship in Pakistan
-
+
@@ -7267,7 +7268,7 @@ Identity-Based Steganography and Its Applications to Censorship Resistance
-
+
@@ -7295,7 +7296,7 @@ Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest
-
+
@@ -7323,7 +7324,7 @@ On the Feasibility of a Censorship Resistant Decentralized Name System
-
+
@@ -7351,7 +7352,7 @@ rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
-
+
@@ -7379,7 +7380,7 @@ Towards a Censorship Analyser for Tor
-
+
@@ -7407,7 +7408,7 @@ ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship
-
+
@@ -7435,7 +7436,7 @@ SWEET: Serving the Web by Exploiting Email Tunnels
-
+
@@ -7463,7 +7464,7 @@ The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
-
+
@@ -7493,7 +7494,7 @@ Technical analysis of the Ultrasurf proxying software
-
+
@@ -7521,7 +7522,7 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource
-
+
@@ -7549,7 +7550,7 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network
-
+
@@ -7577,7 +7578,7 @@ The Collateral Damage of Internet Censorship by DNS Injection
-
+
@@ -7605,7 +7606,7 @@ Hold-On: Protecting Against On-Path DNS Poisoning
-
+
@@ -7633,7 +7634,7 @@ Evading Censorship with Browser-Based Proxies
-
+
@@ -7661,7 +7662,7 @@ OONI: Open Observatory of Network Interference
-
+
@@ -7689,7 +7690,7 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr
-
+
@@ -7717,7 +7718,7 @@ Bootstrapping Communications into an Anti-Censorship System
-
+
@@ -7745,7 +7746,7 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
-
+
@@ -7773,7 +7774,7 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges
-
+
@@ -7801,7 +7802,7 @@ Secure Communication over Diverse Transports
-
+
@@ -7829,7 +7830,7 @@ Routing Around Decoys
-
+
@@ -7857,7 +7858,7 @@ Adapting Social Spam Infrastructure for Political Censorship
-
+
@@ -7885,7 +7886,7 @@ One-way indexing for plausible deniability in censorship resistant storage
-
+
@@ -7913,7 +7914,7 @@ Inferring Mechanics of Web Censorship Around the World
-
+
@@ -7941,7 +7942,7 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista
-
+
@@ -7969,7 +7970,7 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System
-
+
@@ -7997,7 +7998,7 @@ How the Great Firewall of China is Blocking Tor
-
+
@@ -8025,7 +8026,7 @@ Regional Variation in Chinese Internet Filtering
-
+
@@ -8055,7 +8056,7 @@ BridgeSPA: Improving Tor Bridges with Single Packet Authorization
-
+
@@ -8083,7 +8084,7 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
-
+
@@ -8111,7 +8112,7 @@ In Proc. of: Free and Open Communications on the Internet
-
+
@@ -8139,7 +8140,7 @@ Scrambling for lightweight censorship resistance
-
+
@@ -8167,7 +8168,7 @@ Analysis of Country-wide Internet Outages Caused by Censorship
-
+
@@ -8195,7 +8196,7 @@ An anomaly-based censorship-detection system for Tor
-
+
@@ -8223,7 +8224,7 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events
-
+
@@ -8251,7 +8252,7 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible
-
+
@@ -8279,7 +8280,7 @@ Decoy Routing: Toward Unblockable Internet Communication
-
+
@@ -8307,7 +8308,7 @@ Bypassing Internet Censorship for News Broadcasters
-
+
@@ -8335,7 +8336,7 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh
-
+
@@ -8363,7 +8364,7 @@ Tor Instead of IP
-
+
@@ -8391,7 +8392,7 @@ Proximax: A Measurement Based System for Proxies Dissemination
-
+
@@ -8419,7 +8420,7 @@ Mapping Local Internet Control
-
+
@@ -8447,7 +8448,7 @@ Infrastructures of Censorship and Lessons from Copyright Resistance
-
+
@@ -8475,7 +8476,7 @@ CensMon: A Web Censorship Monitor
-
+
@@ -8503,7 +8504,7 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and
-
+
@@ -8531,7 +8532,7 @@ Dust: A Blocking-Resistant Internet Transport Protocol
-
+
@@ -8559,7 +8560,7 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
-
+
@@ -8587,7 +8588,7 @@ Telex: Anticensorship in the Network Infrastructure
-
+
@@ -8615,7 +8616,7 @@ Internet Censorship in China: Where Does the Filtering Occur?
-
+
@@ -8645,7 +8646,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka
-
+
@@ -8673,7 +8674,7 @@ Chipping Away at Censorship Firewalls with User-Generated Content
-
+
@@ -8701,7 +8702,7 @@ Fighting Censorship with Algorithms
-
+
@@ -8729,7 +8730,7 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back
-
+
@@ -8759,7 +8760,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r
-
+
@@ -8787,7 +8788,7 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks
-
+
@@ -8815,7 +8816,7 @@ SkyF2F: Censorship Resistant via Skype Overlay Network
-
+
@@ -8843,7 +8844,7 @@ Detecting Forged TCP Reset Packets
-
+
@@ -8873,7 +8874,7 @@ In Proc. of: Network and Distributed System Security,
-
+
@@ -8901,7 +8902,7 @@ Pass it on: Social Networks Stymie Censors
-
+
@@ -8931,7 +8932,7 @@ ConceptDoppler: A Weather Tracker for Internet Censorship
-
+
@@ -8959,7 +8960,7 @@ The Great DNS Wall of China
-
+
@@ -8989,7 +8990,7 @@ Investigating large-scale Internet content filtering
-
+
@@ -9017,7 +9018,7 @@ Ignoring the Great Firewall of China
-
+
@@ -9045,7 +9046,7 @@ Failures in a Hybrid Content Blocking System
-
+
@@ -9073,7 +9074,7 @@ Design of a blocking-resistant anonymity system
-
+
@@ -9103,7 +9104,7 @@ Censorship Resistance Revisited
-
+
@@ -9133,7 +9134,7 @@ The Economics of Censorship Resistance
-
+
@@ -9161,7 +9162,7 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S
-
+
@@ -9191,7 +9192,7 @@ Government mandated blocking of foreign Web content
-
+
@@ -9219,7 +9220,7 @@ Thwarting Web Censorship with Untrusted Messenger Discovery
-
+
@@ -9249,7 +9250,7 @@ Infranet: Circumventing Web Censorship and Surveillance
-
+
@@ -9277,7 +9278,7 @@ Anonymizing Censorship Resistant Systems
-
+
@@ -9307,7 +9308,7 @@ Dagster: Censorship-Resistant Publishing Without Replication
-
+
@@ -9335,7 +9336,7 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement
-
+
@@ -9365,7 +9366,7 @@ Publius: A robust, tamper-evident, censorship-resistant web publishing system
-
+
@@ -9395,7 +9396,7 @@ The Eternity Service
-
+