From 1ecc6d05b449e876f380f353b72b9eefc706062e Mon Sep 17 00:00:00 2001 From: NullHypothesis Date: Sat, 15 Jun 2024 00:18:39 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20@=20NullHypo?= =?UTF-8?q?thesis/censorbib@72c1291d428aed268d21b048070ccf42792dfe7a=20?= =?UTF-8?q?=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- index.html | 386 +++++++++++++++++++++++++++-------------------------- 1 file changed, 195 insertions(+), 191 deletions(-) diff --git a/index.html b/index.html index f244e9a..9b53819 100644 --- a/index.html +++ b/index.html @@ -185,7 +185,7 @@ @@ -3404,6 +3404,7 @@ In Proc. of: Internet Measurement Conference, 2018, A Secure asymmetry and deployability for decoy routing systems +Discussion icon Download icon @@ -3432,13 +3433,14 @@ In: Privacy Enhancing Technologies, 2018, De Gruyter Effective Detection of Multimedia Protocol Tunneling using Machine Learning +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3467,7 +3469,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship Cached download icon - + BibTeX download icon @@ -3495,7 +3497,7 @@ Incentivizing Censorship Measurements via Circumvention Cached download icon - + BibTeX download icon @@ -3524,7 +3526,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges Cached download icon - + BibTeX download icon @@ -3546,13 +3548,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -3580,7 +3583,7 @@ An analysis of automatic image filtering on WeChat Moments Cached download icon - + BibTeX download icon @@ -3608,7 +3611,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability Cached download icon - + BibTeX download icon @@ -3636,7 +3639,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China Cached download icon - + BibTeX download icon @@ -3664,7 +3667,7 @@ How Sudden Censorship Can Increase Access to Information Cached download icon - + BibTeX download icon @@ -3692,7 +3695,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study Cached download icon - + BibTeX download icon @@ -3720,7 +3723,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers Cached download icon - + BibTeX download icon @@ -3834,7 +3837,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor Cached download icon - + BibTeX download icon @@ -3862,7 +3865,7 @@ Mending Wall: On the Implementation of Censorship in India Cached download icon - + BibTeX download icon @@ -3890,7 +3893,7 @@ Online Advertising under Internet Censorship Cached download icon - + BibTeX download icon @@ -3918,7 +3921,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Cached download icon - + BibTeX download icon @@ -3946,7 +3949,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Cached download icon - + BibTeX download icon @@ -3974,7 +3977,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and Cached download icon - + BibTeX download icon @@ -4002,7 +4005,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac Cached download icon - + BibTeX download icon @@ -4030,7 +4033,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Cached download icon - + BibTeX download icon @@ -4058,7 +4061,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid Cached download icon - + BibTeX download icon @@ -4086,7 +4089,7 @@ When the Internet Goes Down in Bangladesh Cached download icon - + BibTeX download icon @@ -4114,7 +4117,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking Cached download icon - + BibTeX download icon @@ -4142,7 +4145,7 @@ Global Measurement of DNS Manipulation Cached download icon - + BibTeX download icon @@ -4170,7 +4173,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL Cached download icon - + BibTeX download icon @@ -4198,7 +4201,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Cached download icon - + BibTeX download icon @@ -4226,7 +4229,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the Cached download icon - + BibTeX download icon @@ -4248,13 +4251,14 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -4282,7 +4286,7 @@ An ISP-Scale Deployment of TapDance Cached download icon - + BibTeX download icon @@ -4310,7 +4314,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video Cached download icon - + BibTeX download icon @@ -4338,7 +4342,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists Cached download icon - + BibTeX download icon @@ -4366,7 +4370,7 @@ A Usability Evaluation of Tor Launcher Cached download icon - + BibTeX download icon @@ -4394,7 +4398,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions Cached download icon - + BibTeX download icon @@ -4422,7 +4426,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Cached download icon - + BibTeX download icon @@ -4450,7 +4454,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats Cached download icon - + BibTeX download icon @@ -4478,7 +4482,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras Cached download icon - + BibTeX download icon @@ -4536,7 +4540,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses Cached download icon - + BibTeX download icon @@ -4565,7 +4569,7 @@ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement Cached download icon - + BibTeX download icon @@ -4593,7 +4597,7 @@ Game of Decoys: Optimal Decoy Routing Through Game Theory Cached download icon - + BibTeX download icon @@ -4621,7 +4625,7 @@ Practical Censorship Evasion Leveraging Content Delivery Networks Cached download icon - + BibTeX download icon @@ -4649,7 +4653,7 @@ DNS-sly: Avoiding Censorship through Network Complexity Cached download icon - + BibTeX download icon @@ -4677,7 +4681,7 @@ Matryoshka: Hiding Secret Communication in Plain Sight Cached download icon - + BibTeX download icon @@ -4705,7 +4709,7 @@ GhostPost: Seamless Restoration of Censored Social Media Posts Cached download icon - + BibTeX download icon @@ -4733,7 +4737,7 @@ Censors’ Delay in Blocking Circumvention Proxies Cached download icon - + BibTeX download icon @@ -4761,7 +4765,7 @@ The Politics of Routing: Investigating the Relationship Between AS Connectivity Cached download icon - + BibTeX download icon @@ -4789,7 +4793,7 @@ A Framework for the Game-theoretic Analysis of Censorship Resistance Cached download icon - + BibTeX download icon @@ -4817,7 +4821,7 @@ SoK: Making Sense of Censorship Resistance Systems Cached download icon - + BibTeX download icon @@ -4846,7 +4850,7 @@ Salmon: Robust Proxy Distribution for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -4874,7 +4878,7 @@ Satellite: Joint Analysis of CDNs and Network-Level Interference Cached download icon - + BibTeX download icon @@ -4902,7 +4906,7 @@ Analyzing Internet Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -4930,7 +4934,7 @@ Leveraging Internet Services to Evade Censorship Cached download icon - + BibTeX download icon @@ -4958,7 +4962,7 @@ Games Without Frontiers: Investigating Video Games as a Covert Channel Cached download icon - + BibTeX download icon @@ -4986,7 +4990,7 @@ Mailet: Instant Social Networking under Censorship Cached download icon - + BibTeX download icon @@ -5014,7 +5018,7 @@ CovertCast: Using Live Streaming to Evade Internet Censorship Cached download icon - + BibTeX download icon @@ -5042,7 +5046,7 @@ SkypeLine: Robust Hidden Data Transmission for VoIP Cached download icon - + BibTeX download icon @@ -5070,7 +5074,7 @@ Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regi Cached download icon - + BibTeX download icon @@ -5098,7 +5102,7 @@ SoK: Towards Grounding Censorship Circumvention in Empiricism Cached download icon - + BibTeX download icon @@ -5128,7 +5132,7 @@ Alibi Routing Cached download icon - + BibTeX download icon @@ -5156,7 +5160,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement Cached download icon - + BibTeX download icon @@ -5184,7 +5188,7 @@ Rebound: Decoy Routing on Asymmetric Routes Via Error Messages Cached download icon - + BibTeX download icon @@ -5212,7 +5216,7 @@ Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homopho Cached download icon - + BibTeX download icon @@ -5240,7 +5244,7 @@ A Case for Marrying Censorship Measurements with Circumvention Cached download icon - + BibTeX download icon @@ -5268,7 +5272,7 @@ Can Censorship Measurements Be Safe(r)? Cached download icon - + BibTeX download icon @@ -5296,7 +5300,7 @@ Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Pl Cached download icon - + BibTeX download icon @@ -5324,7 +5328,7 @@ Known Unknowns: An Analysis of Twitter Censorship in Turkey Cached download icon - + BibTeX download icon @@ -5353,7 +5357,7 @@ Examining How the Great Firewall Discovers Hidden Circumvention Servers Cached download icon - + BibTeX download icon @@ -5381,7 +5385,7 @@ CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content Cached download icon - + BibTeX download icon @@ -5409,7 +5413,7 @@ Seeing through Network-Protocol Obfuscation Cached download icon - + BibTeX download icon @@ -5437,7 +5441,7 @@ Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Cached download icon - + BibTeX download icon @@ -5465,7 +5469,7 @@ Understanding Internet Censorship Policy: The Case of Greece Cached download icon - + BibTeX download icon @@ -5493,7 +5497,7 @@ Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms Cached download icon - + BibTeX download icon @@ -5521,7 +5525,7 @@ An Analysis of China’s “Great Cannon” Cached download icon - + BibTeX download icon @@ -5549,7 +5553,7 @@ Marionette: A Programmable Network-Traffic Obfuscation System Cached download icon - + BibTeX download icon @@ -5577,7 +5581,7 @@ Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Cached download icon - + BibTeX download icon @@ -5605,7 +5609,7 @@ Ethical Concerns for Censorship Measurement Cached download icon - + BibTeX download icon @@ -5633,7 +5637,7 @@ Analyzing the Great Firewall of China Over Space and Time Cached download icon - + BibTeX download icon @@ -5661,7 +5665,7 @@ Blocking-resistant communication through domain fronting Cached download icon - + BibTeX download icon @@ -5689,7 +5693,7 @@ Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Cached download icon - + BibTeX download icon @@ -5717,7 +5721,7 @@ Internet Censorship detection: A survey Cached download icon - + BibTeX download icon @@ -5745,7 +5749,7 @@ Monitoring Internet Censorship with UBICA Cached download icon - + BibTeX download icon @@ -5775,7 +5779,7 @@ GoHop: Personal VPN to Defend from Censorship Cached download icon - + BibTeX download icon @@ -5803,7 +5807,7 @@ Global Network Interference Detection over the RIPE Atlas Network Cached download icon - + BibTeX download icon @@ -5831,7 +5835,7 @@ Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship Cached download icon - + BibTeX download icon @@ -5859,7 +5863,7 @@ CloudTransport: Using Cloud Storage for Censorship-Resistant Networking Cached download icon - + BibTeX download icon @@ -5887,7 +5891,7 @@ Censorship in the Wild: Analyzing Internet Filtering in Syria Cached download icon - + BibTeX download icon @@ -5915,7 +5919,7 @@ TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Cached download icon - + BibTeX download icon @@ -5943,7 +5947,7 @@ Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Cached download icon - + BibTeX download icon @@ -5971,7 +5975,7 @@ No Direction Home: The True Cost of Routing Around Decoys Cached download icon - + BibTeX download icon @@ -5999,7 +6003,7 @@ Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Cached download icon - + BibTeX download icon @@ -6027,7 +6031,7 @@ Automated Detection and Fingerprinting of Censorship Block Pages Cached download icon - + BibTeX download icon @@ -6055,7 +6059,7 @@ A Look at the Consequences of Internet Censorship Through an ISP Lens Cached download icon - + BibTeX download icon @@ -6083,7 +6087,7 @@ Reverse-engineering censorship in China: Randomized experimentation and particip Cached download icon - + BibTeX download icon @@ -6111,7 +6115,7 @@ Facet: Streaming over Videoconferencing for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6139,7 +6143,7 @@ LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Cached download icon - + BibTeX download icon @@ -6167,7 +6171,7 @@ Toward automatic censorship detection in microblogs Cached download icon - + BibTeX download icon @@ -6195,7 +6199,7 @@ VPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance Cached download icon - + BibTeX download icon @@ -6223,7 +6227,7 @@ Measuring Freenet in the Wild: Censorship-resilience under Observation Cached download icon - + BibTeX download icon @@ -6251,7 +6255,7 @@ Censorship Resistance as a Side-Effect Cached download icon - + BibTeX download icon @@ -6279,7 +6283,7 @@ A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System Cached download icon - + BibTeX download icon @@ -6307,7 +6311,7 @@ TapDance: End-to-Middle Anticensorship without Flow Blocking Cached download icon - + BibTeX download icon @@ -6365,7 +6369,7 @@ Self-Censorship on Facebook Cached download icon - + BibTeX download icon @@ -6393,7 +6397,7 @@ Dimming the Internet: Detecting Throttling as a Mechanism of Censorship in Iran Cached download icon - + BibTeX download icon @@ -6422,7 +6426,7 @@ Internet Censorship in Iran: A First Look Cached download icon - + BibTeX download icon @@ -6450,7 +6454,7 @@ Gaining Insight into AS-level Outages through Analysis of Internet Background Ra Cached download icon - + BibTeX download icon @@ -6478,7 +6482,7 @@ Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on S Cached download icon - + BibTeX download icon @@ -6506,7 +6510,7 @@ A Method for Identifying and Confirming the Use of URL Filtering Products for Ce Cached download icon - + BibTeX download icon @@ -6534,7 +6538,7 @@ Revealing Middlebox Interference with Tracebox Cached download icon - + BibTeX download icon @@ -6562,7 +6566,7 @@ Protocol Misidentification Made Easy with Format-Transforming Encryption Cached download icon - + BibTeX download icon @@ -6590,7 +6594,7 @@ OSS: Using Online Scanning Services for Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6618,7 +6622,7 @@ Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention Cached download icon - + BibTeX download icon @@ -6646,7 +6650,7 @@ Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Cached download icon - + BibTeX download icon @@ -6674,7 +6678,7 @@ I want my voice to be heard: IP over Voice-over-IP for unobservable censorship c Cached download icon - + BibTeX download icon @@ -6703,7 +6707,7 @@ The Parrot is Dead: Observing Unobservable Network Communications Cached download icon - + BibTeX download icon @@ -6731,7 +6735,7 @@ Message In A Bottle: Sailing Past Censorship Cached download icon - + BibTeX download icon @@ -6759,7 +6763,7 @@ Towards Illuminating a Censorship Monitor’s Model to Facilitate Evasion Cached download icon - + BibTeX download icon @@ -6787,7 +6791,7 @@ The Anatomy of Web Censorship in Pakistan Cached download icon - + BibTeX download icon @@ -6815,7 +6819,7 @@ Identity-Based Steganography and Its Applications to Censorship Resistance Cached download icon - + BibTeX download icon @@ -6843,7 +6847,7 @@ Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest Cached download icon - + BibTeX download icon @@ -6871,7 +6875,7 @@ On the Feasibility of a Censorship Resistant Decentralized Name System Cached download icon - + BibTeX download icon @@ -6899,7 +6903,7 @@ rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Cached download icon - + BibTeX download icon @@ -6927,7 +6931,7 @@ Towards a Censorship Analyser for Tor Cached download icon - + BibTeX download icon @@ -6955,7 +6959,7 @@ ScrambleSuit: A Polymorphic Network Protocol to Circumvent Censorship Cached download icon - + BibTeX download icon @@ -6983,7 +6987,7 @@ SWEET: Serving the Web by Exploiting Email Tunnels Cached download icon - + BibTeX download icon @@ -7011,7 +7015,7 @@ The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions Cached download icon - + BibTeX download icon @@ -7069,7 +7073,7 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource Cached download icon - + BibTeX download icon @@ -7097,7 +7101,7 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network Cached download icon - + BibTeX download icon @@ -7125,7 +7129,7 @@ The Collateral Damage of Internet Censorship by DNS Injection Cached download icon - + BibTeX download icon @@ -7153,7 +7157,7 @@ Hold-On: Protecting Against On-Path DNS Poisoning Cached download icon - + BibTeX download icon @@ -7181,7 +7185,7 @@ Evading Censorship with Browser-Based Proxies Cached download icon - + BibTeX download icon @@ -7209,7 +7213,7 @@ OONI: Open Observatory of Network Interference Cached download icon - + BibTeX download icon @@ -7237,7 +7241,7 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr Cached download icon - + BibTeX download icon @@ -7265,7 +7269,7 @@ Bootstrapping Communications into an Anti-Censorship System Cached download icon - + BibTeX download icon @@ -7293,7 +7297,7 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery Cached download icon - + BibTeX download icon @@ -7321,7 +7325,7 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges Cached download icon - + BibTeX download icon @@ -7349,7 +7353,7 @@ Secure Communication over Diverse Transports Cached download icon - + BibTeX download icon @@ -7377,7 +7381,7 @@ Routing Around Decoys Cached download icon - + BibTeX download icon @@ -7405,7 +7409,7 @@ Adapting Social Spam Infrastructure for Political Censorship Cached download icon - + BibTeX download icon @@ -7433,7 +7437,7 @@ One-way indexing for plausible deniability in censorship resistant storage Cached download icon - + BibTeX download icon @@ -7461,7 +7465,7 @@ Inferring Mechanics of Web Censorship Around the World Cached download icon - + BibTeX download icon @@ -7489,7 +7493,7 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista Cached download icon - + BibTeX download icon @@ -7517,7 +7521,7 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System Cached download icon - + BibTeX download icon @@ -7545,7 +7549,7 @@ How the Great Firewall of China is Blocking Tor Cached download icon - + BibTeX download icon @@ -7573,7 +7577,7 @@ Regional Variation in Chinese Internet Filtering Cached download icon - + BibTeX download icon @@ -7603,7 +7607,7 @@ BridgeSPA: Improving Tor Bridges with Single Packet Authorization Cached download icon - + BibTeX download icon @@ -7631,7 +7635,7 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing Cached download icon - + BibTeX download icon @@ -7659,7 +7663,7 @@ In Proc. of: Free and Open Communications on the Internet Cached download icon - + BibTeX download icon @@ -7687,7 +7691,7 @@ Scrambling for lightweight censorship resistance Cached download icon - + BibTeX download icon @@ -7715,7 +7719,7 @@ Analysis of Country-wide Internet Outages Caused by Censorship Cached download icon - + BibTeX download icon @@ -7743,7 +7747,7 @@ An anomaly-based censorship-detection system for Tor Cached download icon - + BibTeX download icon @@ -7771,7 +7775,7 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events Cached download icon - + BibTeX download icon @@ -7799,7 +7803,7 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Cached download icon - + BibTeX download icon @@ -7827,7 +7831,7 @@ Decoy Routing: Toward Unblockable Internet Communication Cached download icon - + BibTeX download icon @@ -7855,7 +7859,7 @@ Bypassing Internet Censorship for News Broadcasters Cached download icon - + BibTeX download icon @@ -7883,7 +7887,7 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh Cached download icon - + BibTeX download icon @@ -7911,7 +7915,7 @@ Tor Instead of IP Cached download icon - + BibTeX download icon @@ -7939,7 +7943,7 @@ Proximax: A Measurement Based System for Proxies Dissemination Cached download icon - + BibTeX download icon @@ -7967,7 +7971,7 @@ Mapping Local Internet Control Cached download icon - + BibTeX download icon @@ -7995,7 +7999,7 @@ Infrastructures of Censorship and Lessons from Copyright Resistance Cached download icon - + BibTeX download icon @@ -8023,7 +8027,7 @@ CensMon: A Web Censorship Monitor Cached download icon - + BibTeX download icon @@ -8051,7 +8055,7 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and Cached download icon - + BibTeX download icon @@ -8079,7 +8083,7 @@ Dust: A Blocking-Resistant Internet Transport Protocol Cached download icon - + BibTeX download icon @@ -8107,7 +8111,7 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics Cached download icon - + BibTeX download icon @@ -8135,7 +8139,7 @@ Telex: Anticensorship in the Network Infrastructure Cached download icon - + BibTeX download icon @@ -8163,7 +8167,7 @@ Internet Censorship in China: Where Does the Filtering Occur? Cached download icon - + BibTeX download icon @@ -8193,7 +8197,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka Cached download icon - + BibTeX download icon @@ -8221,7 +8225,7 @@ Chipping Away at Censorship Firewalls with User-Generated Content Cached download icon - + BibTeX download icon @@ -8249,7 +8253,7 @@ Fighting Censorship with Algorithms Cached download icon - + BibTeX download icon @@ -8277,7 +8281,7 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back Cached download icon - + BibTeX download icon @@ -8307,7 +8311,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r Cached download icon - + BibTeX download icon @@ -8335,7 +8339,7 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks Cached download icon - + BibTeX download icon @@ -8363,7 +8367,7 @@ SkyF2F: Censorship Resistant via Skype Overlay Network Cached download icon - + BibTeX download icon @@ -8391,7 +8395,7 @@ Detecting Forged TCP Reset Packets Cached download icon - + BibTeX download icon @@ -8421,7 +8425,7 @@ In Proc. of: Network and Distributed System Security, Cached download icon - + BibTeX download icon @@ -8449,7 +8453,7 @@ Pass it on: Social Networks Stymie Censors Cached download icon - + BibTeX download icon @@ -8479,7 +8483,7 @@ ConceptDoppler: A Weather Tracker for Internet Censorship Cached download icon - + BibTeX download icon @@ -8507,7 +8511,7 @@ The Great DNS Wall of China Cached download icon - + BibTeX download icon @@ -8537,7 +8541,7 @@ Investigating large-scale Internet content filtering Cached download icon - + BibTeX download icon @@ -8565,7 +8569,7 @@ Ignoring the Great Firewall of China Cached download icon - + BibTeX download icon @@ -8593,7 +8597,7 @@ Failures in a Hybrid Content Blocking System Cached download icon - + BibTeX download icon @@ -8621,7 +8625,7 @@ Design of a blocking-resistant anonymity system Cached download icon - + BibTeX download icon @@ -8651,7 +8655,7 @@ Censorship Resistance Revisited Cached download icon - + BibTeX download icon @@ -8681,7 +8685,7 @@ The Economics of Censorship Resistance Cached download icon - + BibTeX download icon @@ -8709,7 +8713,7 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S Cached download icon - + BibTeX download icon @@ -8739,7 +8743,7 @@ Government mandated blocking of foreign Web content Cached download icon - + BibTeX download icon @@ -8767,7 +8771,7 @@ Thwarting Web Censorship with Untrusted Messenger Discovery Cached download icon - + BibTeX download icon @@ -8797,7 +8801,7 @@ Infranet: Circumventing Web Censorship and Surveillance Cached download icon - + BibTeX download icon @@ -8825,7 +8829,7 @@ Anonymizing Censorship Resistant Systems Cached download icon - + BibTeX download icon @@ -8855,7 +8859,7 @@ Dagster: Censorship-Resistant Publishing Without Replication Cached download icon - + BibTeX download icon @@ -8883,7 +8887,7 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement Cached download icon - + BibTeX download icon @@ -8913,7 +8917,7 @@ Publius: A robust, tamper-evident, censorship-resistant web publishing system Cached download icon - + BibTeX download icon @@ -8943,7 +8947,7 @@ The Eternity Service Cached download icon - + BibTeX download icon