mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-22 14:10:55 -04:00
Deploying to gh-pages from @ NullHypothesis/censorbib@76a70cad6f 🚀
This commit is contained in:
parent
092b7e3278
commit
642d26a91d
1 changed files with 81 additions and 81 deletions
162
index.html
162
index.html
|
@ -185,7 +185,7 @@
|
|||
</div>
|
||||
<div class="menu-item">
|
||||
<img class="top-icon" src="assets/update-icon.svg" alt="update icon">
|
||||
<a href="https://github.com/NullHypothesis/censorbib/commits/master">Updated: 2024-07-20</a>
|
||||
<a href="https://github.com/NullHypothesis/censorbib/commits/master">Updated: 2024-08-14</a>
|
||||
</div>
|
||||
</div> <!-- censorbib-links -->
|
||||
|
||||
|
@ -2934,6 +2934,7 @@ In Proc. of: <span class="venue">Free and Open Communications on the Internet</s
|
|||
Slitheen++: Stealth TLS-based Decoy Routing
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='https://github.com/net4people/bbs/issues/51'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||||
<a href='https://www.usenix.org/system/files/foci20-paper-birtel_0.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
|
@ -2969,7 +2970,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil
|
|||
<a href='https://censorbib.nymity.ch/pdf/Bock2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L922'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L923'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Bock2020a'>
|
||||
|
@ -2997,7 +2998,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols
|
|||
<a href='https://censorbib.nymity.ch/pdf/Fifield2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L932'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L933'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Fifield2020a'>
|
||||
|
@ -3026,7 +3027,7 @@ HTTPT: A Probe-Resistant Proxy
|
|||
<a href='https://censorbib.nymity.ch/pdf/Frolov2020b.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L941'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L942'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Frolov2020b'>
|
||||
|
@ -3054,7 +3055,7 @@ How India Censors the Web
|
|||
<a href='https://censorbib.nymity.ch/pdf/Singh2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L951'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L952'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Singh2020a'>
|
||||
|
@ -3083,7 +3084,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch
|
|||
<a href='https://censorbib.nymity.ch/pdf/Zhu2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L960'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L961'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Zhu2020a'>
|
||||
|
@ -3112,7 +3113,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System
|
|||
<a href='https://censorbib.nymity.ch/pdf/Sharma2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L972'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L973'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Sharma2020a'>
|
||||
|
@ -3141,7 +3142,7 @@ Running Refraction Networking for Real
|
|||
<a href='https://censorbib.nymity.ch/pdf/VanderSloot2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L985'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L986'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#VanderSloot2020a'>
|
||||
|
@ -3170,7 +3171,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie
|
|||
<a href='https://censorbib.nymity.ch/pdf/Minaei2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L998'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L999'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Minaei2020a'>
|
||||
|
@ -3199,7 +3200,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
|
|||
<a href='https://censorbib.nymity.ch/pdf/Niaki2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1019'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1020'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Niaki2020a'>
|
||||
|
@ -3228,7 +3229,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco
|
|||
<a href='https://censorbib.nymity.ch/pdf/Wang2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1029'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1030'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Wang2020a'>
|
||||
|
@ -3257,7 +3258,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses
|
|||
<a href='https://censorbib.nymity.ch/pdf/Nasr2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1039'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1040'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Nasr2020a'>
|
||||
|
@ -3286,7 +3287,7 @@ Detecting Probe-resistant Proxies
|
|||
<a href='https://censorbib.nymity.ch/pdf/Frolov2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1049'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1050'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Frolov2020a'>
|
||||
|
@ -3315,7 +3316,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale
|
|||
<a href='https://censorbib.nymity.ch/pdf/Raman2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1059'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1060'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Raman2020a'>
|
||||
|
@ -3344,7 +3345,7 @@ Decentralized Control: A Case Study of Russia
|
|||
<a href='https://censorbib.nymity.ch/pdf/Ramesh2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1069'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1070'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Ramesh2020a'>
|
||||
|
@ -3372,7 +3373,7 @@ Protocol Proxy: An FTE-based covert channel
|
|||
<a href='https://censorbib.nymity.ch/pdf/Oakley2020a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1079'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1080'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Oakley2020a'>
|
||||
|
@ -3403,7 +3404,7 @@ Conjure: Summoning Proxies from Unused Address Space
|
|||
<a href='https://censorbib.nymity.ch/pdf/Frolov2019b.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1105'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1106'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Frolov2019b'>
|
||||
|
@ -3432,7 +3433,7 @@ Geneva: Evolving Censorship Evasion Strategies
|
|||
<a href='https://censorbib.nymity.ch/pdf/Bock2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1115'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1116'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Bock2019a'>
|
||||
|
@ -3460,7 +3461,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico
|
|||
<a href='https://censorbib.nymity.ch/pdf/Iszaevich2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1125'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1126'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Iszaevich2019a'>
|
||||
|
@ -3488,7 +3489,7 @@ Shedding Light on Mobile App Store Censorship
|
|||
<a href='https://censorbib.nymity.ch/pdf/Ververis2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1134'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1135'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Ververis2019a'>
|
||||
|
@ -3517,7 +3518,7 @@ Improving Meek With Adversarial Techniques
|
|||
<a href='https://censorbib.nymity.ch/pdf/Sheffey2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1152'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1153'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Sheffey2019a'>
|
||||
|
@ -3546,7 +3547,7 @@ On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention
|
|||
<a href='https://censorbib.nymity.ch/pdf/Chai2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1162'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1163'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Chai2019a'>
|
||||
|
@ -3574,7 +3575,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat
|
|||
<a href='https://censorbib.nymity.ch/pdf/Knockel2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1172'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1173'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Knockel2019a'>
|
||||
|
@ -3603,7 +3604,7 @@ Measuring I2P Censorship at a Global Scale
|
|||
<a href='https://censorbib.nymity.ch/pdf/Hoang2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1181'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1182'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Hoang2019a'>
|
||||
|
@ -3631,7 +3632,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
|
|||
<a href='https://censorbib.nymity.ch/pdf/Nasr2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1200'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1201'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Nasr2019a'>
|
||||
|
@ -3660,7 +3661,7 @@ The use of TLS in Censorship Circumvention
|
|||
<a href='https://censorbib.nymity.ch/pdf/Frolov2019a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1209'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1210'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Frolov2019a'>
|
||||
|
@ -3690,7 +3691,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce
|
|||
<a href='https://censorbib.nymity.ch/pdf/Wright2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1143'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1144'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Wright2018a'>
|
||||
|
@ -3718,7 +3719,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
|
|||
<a href='https://censorbib.nymity.ch/pdf/Yadav2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1228'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1229'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Yadav2018a'>
|
||||
|
@ -3746,7 +3747,7 @@ In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2018, A
|
|||
<a href='https://censorbib.nymity.ch/pdf/McDonald2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1237'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1238'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#McDonald2018a'>
|
||||
|
@ -3774,7 +3775,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance
|
|||
<a href='https://censorbib.nymity.ch/pdf/Hoang2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1246'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1247'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Hoang2018a'>
|
||||
|
@ -3803,7 +3804,7 @@ Secure asymmetry and deployability for decoy routing systems
|
|||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1255'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1256'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Bocovich2018a'>
|
||||
|
@ -3832,7 +3833,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning
|
|||
<a href='https://censorbib.nymity.ch/pdf/Barradas2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1268'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1269'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Barradas2018a'>
|
||||
|
@ -3861,7 +3862,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship
|
|||
<a href='https://censorbib.nymity.ch/pdf/VanderSloot2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1278'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1279'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#VanderSloot2018a'>
|
||||
|
@ -3889,7 +3890,7 @@ Incentivizing Censorship Measurements via Circumvention
|
|||
<a href='https://censorbib.nymity.ch/pdf/Nisar2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1288'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1289'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Nisar2018a'>
|
||||
|
@ -3918,7 +3919,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges
|
|||
<a href='https://censorbib.nymity.ch/pdf/Dunna2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1297'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1298'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Dunna2018a'>
|
||||
|
@ -3947,7 +3948,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
|
|||
<a href='https://censorbib.nymity.ch/pdf/Manfredi2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1307'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1308'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Manfredi2018a'>
|
||||
|
@ -3975,7 +3976,7 @@ An analysis of automatic image filtering on WeChat Moments
|
|||
<a href='https://censorbib.nymity.ch/pdf/Knockel2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1317'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1318'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Knockel2018a'>
|
||||
|
@ -4003,7 +4004,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability
|
|||
<a href='https://censorbib.nymity.ch/pdf/Tschantz2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1326'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1327'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Tschantz2018a'>
|
||||
|
@ -4031,7 +4032,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China
|
|||
<a href='https://censorbib.nymity.ch/pdf/Hounsel2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1335'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1336'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Hounsel2018a'>
|
||||
|
@ -4059,7 +4060,7 @@ How Sudden Censorship Can Increase Access to Information
|
|||
<a href='https://censorbib.nymity.ch/pdf/Hobbs2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1344'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1345'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Hobbs2018a'>
|
||||
|
@ -4087,7 +4088,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study
|
|||
<a href='https://censorbib.nymity.ch/pdf/Ng2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1374'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1375'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Ng2018a'>
|
||||
|
@ -4115,7 +4116,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers
|
|||
<a href='https://censorbib.nymity.ch/pdf/Martiny2018a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1400'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1401'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Martiny2018a'>
|
||||
|
@ -4173,7 +4174,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage
|
|||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1191'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1192'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Bocovich2017a'>
|
||||
|
@ -4201,7 +4202,7 @@ The Random Forest based Detection of Shadowsock’s Traffic
|
|||
<a href='https://censorbib.nymity.ch/pdf/Deng2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1219'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1220'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Deng2017a'>
|
||||
|
@ -4229,7 +4230,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor
|
|||
<a href='https://censorbib.nymity.ch/pdf/Li2017b.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1356'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1357'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Li2017b'>
|
||||
|
@ -4257,7 +4258,7 @@ Mending Wall: On the Implementation of Censorship in India
|
|||
<a href='https://censorbib.nymity.ch/pdf/Gosain2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1391'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1392'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Gosain2017a'>
|
||||
|
@ -4285,7 +4286,7 @@ Online Advertising under Internet Censorship
|
|||
<a href='https://censorbib.nymity.ch/pdf/Javaid2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1409'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1410'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Javaid2017a'>
|
||||
|
@ -4313,7 +4314,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling
|
|||
<a href='https://censorbib.nymity.ch/pdf/Ververis2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1418'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1419'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Ververis2017a'>
|
||||
|
@ -4341,7 +4342,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
|
|||
<a href='https://censorbib.nymity.ch/pdf/Lu2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1427'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1428'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Lu2017a'>
|
||||
|
@ -4369,7 +4370,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and
|
|||
<a href='https://censorbib.nymity.ch/pdf/Cho2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1436'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1437'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Cho2017a'>
|
||||
|
@ -4397,7 +4398,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac
|
|||
<a href='https://censorbib.nymity.ch/pdf/Nasr2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1454'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1455'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Nasr2017a'>
|
||||
|
@ -4425,7 +4426,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
|
|||
<a href='https://censorbib.nymity.ch/pdf/Wang2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1472'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1473'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Wang2017a'>
|
||||
|
@ -4453,7 +4454,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid
|
|||
<a href='https://censorbib.nymity.ch/pdf/Li2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1481'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1482'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Li2017a'>
|
||||
|
@ -4481,7 +4482,7 @@ When the Internet Goes Down in Bangladesh
|
|||
<a href='https://censorbib.nymity.ch/pdf/Morshed2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1490'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1491'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Morshed2017a'>
|
||||
|
@ -4509,7 +4510,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking
|
|||
<a href='https://censorbib.nymity.ch/pdf/Singh2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1499'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1500'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Singh2017a'>
|
||||
|
@ -4537,7 +4538,7 @@ Global Measurement of DNS Manipulation
|
|||
<a href='https://censorbib.nymity.ch/pdf/Pearce2017b.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1508'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1509'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Pearce2017b'>
|
||||
|
@ -4565,7 +4566,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL
|
|||
<a href='https://censorbib.nymity.ch/pdf/Darer2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1517'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1518'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Darer2017a'>
|
||||
|
@ -4593,7 +4594,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
|
|||
<a href='https://censorbib.nymity.ch/pdf/Knockel2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1526'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1527'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Knockel2017a'>
|
||||
|
@ -4621,7 +4622,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the
|
|||
<a href='https://censorbib.nymity.ch/pdf/Tanash2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1535'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1536'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Tanash2017a'>
|
||||
|
@ -4650,7 +4651,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices
|
|||
<a href='https://censorbib.nymity.ch/pdf/Jermyn2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1544'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1545'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Jermyn2017a'>
|
||||
|
@ -4678,7 +4679,7 @@ An ISP-Scale Deployment of TapDance
|
|||
<a href='https://censorbib.nymity.ch/pdf/Frolov2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1554'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1555'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Frolov2017a'>
|
||||
|
@ -4706,7 +4707,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video
|
|||
<a href='https://censorbib.nymity.ch/pdf/Barradas2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1563'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1564'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Barradas2017a'>
|
||||
|
@ -4734,7 +4735,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists
|
|||
<a href='https://censorbib.nymity.ch/pdf/Weinberg2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1575'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1576'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Weinberg2017a'>
|
||||
|
@ -4762,7 +4763,7 @@ A Usability Evaluation of Tor Launcher
|
|||
<a href='https://censorbib.nymity.ch/pdf/Lee2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1587'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1588'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Lee2017a'>
|
||||
|
@ -4790,7 +4791,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions
|
|||
<a href='https://censorbib.nymity.ch/pdf/Pearce2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1599'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1600'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Pearce2017a'>
|
||||
|
@ -4818,7 +4819,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers
|
|||
<a href='https://censorbib.nymity.ch/pdf/Heydari2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1608'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1609'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Heydari2017a'>
|
||||
|
@ -4846,7 +4847,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats
|
|||
<a href='https://censorbib.nymity.ch/pdf/Gebhart2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1620'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1621'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Gebhart2017a'>
|
||||
|
@ -4874,7 +4875,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras
|
|||
<a href='https://censorbib.nymity.ch/pdf/Matic2017a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1646'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1647'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Matic2017a'>
|
||||
|
@ -4904,7 +4905,7 @@ Fingerprintability of WebRTC
|
|||
<a href='https://censorbib.nymity.ch/pdf/Fifield2016b.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1089'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1090'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Fifield2016b'>
|
||||
|
@ -4932,7 +4933,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses
|
|||
<a href='https://censorbib.nymity.ch/pdf/Farnan2016a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1665'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1666'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Farnan2016a'>
|
||||
|
@ -4954,14 +4955,13 @@ In Proc. of: <span class="venue">Workshop on Privacy in the Electronic Society</
|
|||
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='https://github.com/net4people/bbs/issues/51'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||||
<a href='https://www.cypherpunks.ca/~iang/pubs/slitheen-ccs16.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Bocovich2016a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1674'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1675'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Bocovich2016a'>
|
||||
|
@ -5524,7 +5524,7 @@ Alibi Routing
|
|||
<a href='https://censorbib.nymity.ch/pdf/Levin2015a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1365'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1366'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Levin2015a'>
|
||||
|
@ -5552,7 +5552,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
|
|||
<a href='https://censorbib.nymity.ch/pdf/Narayanan2015a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1383'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1384'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Narayanan2015a'>
|
||||
|
@ -6733,7 +6733,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi
|
|||
<a href='https://censorbib.nymity.ch/pdf/Robinson2013a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1011'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1012'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Robinson2013a'>
|
||||
|
@ -6761,7 +6761,7 @@ Self-Censorship on Facebook
|
|||
<a href='https://censorbib.nymity.ch/pdf/Das2013a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1445'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1446'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Das2013a'>
|
||||
|
@ -7437,7 +7437,7 @@ Technical analysis of the Ultrasurf proxying software
|
|||
<a href='https://censorbib.nymity.ch/pdf/Appelbaum2012a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1097'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1098'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Appelbaum2012a'>
|
||||
|
@ -8589,7 +8589,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka
|
|||
<a href='https://censorbib.nymity.ch/pdf/Pfitzmann2010a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1637'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1638'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Pfitzmann2010a'>
|
||||
|
@ -8703,7 +8703,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r
|
|||
<a href='https://censorbib.nymity.ch/pdf/McLachlan2009a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1463'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1464'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#McLachlan2009a'>
|
||||
|
@ -8933,7 +8933,7 @@ Investigating large-scale Internet content filtering
|
|||
<a href='https://censorbib.nymity.ch/pdf/Wolfgarten2006a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1629'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1630'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Wolfgarten2006a'>
|
||||
|
@ -9135,7 +9135,7 @@ Government mandated blocking of foreign Web content
|
|||
<a href='https://censorbib.nymity.ch/pdf/Dornseif2003a.pdf'>
|
||||
<img class="icon" title="Download cached paper" src="assets/cache-icon.svg" alt="Cached download icon">
|
||||
</a>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1655'>
|
||||
<a href='https://github.com/NullHypothesis/censorbib/blob/master/references.bib#L1656'>
|
||||
<img class="icon" title="Download BibTeX" src="assets/bibtex-icon.svg" alt="BibTeX download icon">
|
||||
</a>
|
||||
<a href='#Dornseif2003a'>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue