From 642d26a91df90b8ee4fc1a39dfad524dc391d26e Mon Sep 17 00:00:00 2001 From: NullHypothesis Date: Wed, 14 Aug 2024 21:59:30 +0000 Subject: [PATCH] =?UTF-8?q?Deploying=20to=20gh-pages=20from=20@=20NullHypo?= =?UTF-8?q?thesis/censorbib@76a70cad6f929569d4c8ec7bed69bdf4121a391e=20?= =?UTF-8?q?=F0=9F=9A=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- index.html | 162 ++++++++++++++++++++++++++--------------------------- 1 file changed, 81 insertions(+), 81 deletions(-) diff --git a/index.html b/index.html index e36703b..d8280a6 100644 --- a/index.html +++ b/index.html @@ -185,7 +185,7 @@ @@ -2934,6 +2934,7 @@ In Proc. of: Free and Open Communications on the Internet +Discussion icon Download icon @@ -2969,7 +2970,7 @@ Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Fil Cached download icon - + BibTeX download icon @@ -2997,7 +2998,7 @@ Turbo Tunnel, a good way to design censorship circumvention protocols Cached download icon - + BibTeX download icon @@ -3026,7 +3027,7 @@ HTTPT: A Probe-Resistant Proxy Cached download icon - + BibTeX download icon @@ -3054,7 +3055,7 @@ How India Censors the Web Cached download icon - + BibTeX download icon @@ -3083,7 +3084,7 @@ Characterizing Transnational Internet Performance and the Great Bottleneck of Ch Cached download icon - + BibTeX download icon @@ -3112,7 +3113,7 @@ SiegeBreaker: An SDN Based Practical Decoy Routing System Cached download icon - + BibTeX download icon @@ -3141,7 +3142,7 @@ Running Refraction Networking for Real Cached download icon - + BibTeX download icon @@ -3170,7 +3171,7 @@ MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencie Cached download icon - + BibTeX download icon @@ -3199,7 +3200,7 @@ ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Cached download icon - + BibTeX download icon @@ -3228,7 +3229,7 @@ SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Disco Cached download icon - + BibTeX download icon @@ -3257,7 +3258,7 @@ MassBrowser: Unblocking the Censored Web for the Masses, by the Masses Cached download icon - + BibTeX download icon @@ -3286,7 +3287,7 @@ Detecting Probe-resistant Proxies Cached download icon - + BibTeX download icon @@ -3315,7 +3316,7 @@ Measuring the Deployment of Network Censorship Filters at Global Scale Cached download icon - + BibTeX download icon @@ -3344,7 +3345,7 @@ Decentralized Control: A Case Study of Russia Cached download icon - + BibTeX download icon @@ -3372,7 +3373,7 @@ Protocol Proxy: An FTE-based covert channel Cached download icon - + BibTeX download icon @@ -3403,7 +3404,7 @@ Conjure: Summoning Proxies from Unused Address Space Cached download icon - + BibTeX download icon @@ -3432,7 +3433,7 @@ Geneva: Evolving Censorship Evasion Strategies Cached download icon - + BibTeX download icon @@ -3460,7 +3461,7 @@ Distributed Detection of Tor Directory Authorities Censorship in Mexico Cached download icon - + BibTeX download icon @@ -3488,7 +3489,7 @@ Shedding Light on Mobile App Store Censorship Cached download icon - + BibTeX download icon @@ -3517,7 +3518,7 @@ Improving Meek With Adversarial Techniques Cached download icon - + BibTeX download icon @@ -3546,7 +3547,7 @@ On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention Cached download icon - + BibTeX download icon @@ -3574,7 +3575,7 @@ An Efficient Method to Determine which Combination of Keywords Triggered Automat Cached download icon - + BibTeX download icon @@ -3603,7 +3604,7 @@ Measuring I2P Censorship at a Global Scale Cached download icon - + BibTeX download icon @@ -3631,7 +3632,7 @@ Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory Cached download icon - + BibTeX download icon @@ -3660,7 +3661,7 @@ The use of TLS in Censorship Circumvention Cached download icon - + BibTeX download icon @@ -3690,7 +3691,7 @@ On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Ce Cached download icon - + BibTeX download icon @@ -3718,7 +3719,7 @@ Where The Light Gets In: Analyzing Web Censorship Mechanisms in India Cached download icon - + BibTeX download icon @@ -3746,7 +3747,7 @@ In Proc. of: Internet Measurement Conference, 2018, A Cached download icon - + BibTeX download icon @@ -3774,7 +3775,7 @@ An Empirical Study of the I2P Anonymity Network and its Censorship Resistance Cached download icon - + BibTeX download icon @@ -3803,7 +3804,7 @@ Secure asymmetry and deployability for decoy routing systems Cached download icon - + BibTeX download icon @@ -3832,7 +3833,7 @@ Effective Detection of Multimedia Protocol Tunneling using Machine Learning Cached download icon - + BibTeX download icon @@ -3861,7 +3862,7 @@ Quack: Scalable Remote Measurement of Application-Layer Censorship Cached download icon - + BibTeX download icon @@ -3889,7 +3890,7 @@ Incentivizing Censorship Measurements via Circumvention Cached download icon - + BibTeX download icon @@ -3918,7 +3919,7 @@ Analyzing China’s Blocking of Unpublished Tor Bridges Cached download icon - + BibTeX download icon @@ -3947,7 +3948,7 @@ MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption Cached download icon - + BibTeX download icon @@ -3975,7 +3976,7 @@ An analysis of automatic image filtering on WeChat Moments Cached download icon - + BibTeX download icon @@ -4003,7 +4004,7 @@ A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability Cached download icon - + BibTeX download icon @@ -4031,7 +4032,7 @@ Automatically Generating a Large, Culture-Specific Blocklist for China Cached download icon - + BibTeX download icon @@ -4059,7 +4060,7 @@ How Sudden Censorship Can Increase Access to Information Cached download icon - + BibTeX download icon @@ -4087,7 +4088,7 @@ Detecting Censorable Content on Sina Weibo: A Pilot Study Cached download icon - + BibTeX download icon @@ -4115,7 +4116,7 @@ Proof-of-Censorship: Enabling centralized censorship-resistant content providers Cached download icon - + BibTeX download icon @@ -4173,7 +4174,7 @@ Lavinia: An audit-payment protocol for censorship-resistant storage Cached download icon - + BibTeX download icon @@ -4201,7 +4202,7 @@ The Random Forest based Detection of Shadowsock’s Traffic Cached download icon - + BibTeX download icon @@ -4229,7 +4230,7 @@ DeTor: Provably Avoiding Geographic Regions in Tor Cached download icon - + BibTeX download icon @@ -4257,7 +4258,7 @@ Mending Wall: On the Implementation of Censorship in India Cached download icon - + BibTeX download icon @@ -4285,7 +4286,7 @@ Online Advertising under Internet Censorship Cached download icon - + BibTeX download icon @@ -4313,7 +4314,7 @@ Internet Censorship Capabilities in Cyprus: An Investigation of Online Gambling Cached download icon - + BibTeX download icon @@ -4341,7 +4342,7 @@ Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue Cached download icon - + BibTeX download icon @@ -4369,7 +4370,7 @@ A Churn for the Better: Localizing Censorship using Network-level Path Churn and Cached download icon - + BibTeX download icon @@ -4397,7 +4398,7 @@ The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attac Cached download icon - + BibTeX download icon @@ -4425,7 +4426,7 @@ Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship Cached download icon - + BibTeX download icon @@ -4453,7 +4454,7 @@ lib·erate, (n): A library for exposing (traffic-classification) rules and avoid Cached download icon - + BibTeX download icon @@ -4481,7 +4482,7 @@ When the Internet Goes Down in Bangladesh Cached download icon - + BibTeX download icon @@ -4509,7 +4510,7 @@ Characterizing the Nature and Dynamics of Tor Exit Blocking Cached download icon - + BibTeX download icon @@ -4537,7 +4538,7 @@ Global Measurement of DNS Manipulation Cached download icon - + BibTeX download icon @@ -4565,7 +4566,7 @@ FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URL Cached download icon - + BibTeX download icon @@ -4593,7 +4594,7 @@ Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Cached download icon - + BibTeX download icon @@ -4621,7 +4622,7 @@ The Decline of Social Media Censorship and the Rise of Self-Censorship after the Cached download icon - + BibTeX download icon @@ -4650,7 +4651,7 @@ Autosonda: Discovering Rules and Triggers of Censorship Devices Cached download icon - + BibTeX download icon @@ -4678,7 +4679,7 @@ An ISP-Scale Deployment of TapDance Cached download icon - + BibTeX download icon @@ -4706,7 +4707,7 @@ DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Video Cached download icon - + BibTeX download icon @@ -4734,7 +4735,7 @@ Topics of Controversy: An Empirical Analysis of Web Censorship Lists Cached download icon - + BibTeX download icon @@ -4762,7 +4763,7 @@ A Usability Evaluation of Tor Launcher Cached download icon - + BibTeX download icon @@ -4790,7 +4791,7 @@ Augur: Internet-Wide Detection of Connectivity Disruptions Cached download icon - + BibTeX download icon @@ -4818,7 +4819,7 @@ Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers Cached download icon - + BibTeX download icon @@ -4846,7 +4847,7 @@ Internet Censorship in Thailand: User Practices and Potential Threats Cached download icon - + BibTeX download icon @@ -4874,7 +4875,7 @@ Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infras Cached download icon - + BibTeX download icon @@ -4904,7 +4905,7 @@ Fingerprintability of WebRTC Cached download icon - + BibTeX download icon @@ -4932,7 +4933,7 @@ Poisoning the Well – Exploring the Great Firewall’s Poisoned DNS Responses Cached download icon - + BibTeX download icon @@ -4954,14 +4955,13 @@ In Proc. of: Workshop on Privacy in the Electronic Society -Discussion icon Download icon Cached download icon - + BibTeX download icon @@ -5524,7 +5524,7 @@ Alibi Routing Cached download icon - + BibTeX download icon @@ -5552,7 +5552,7 @@ No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement Cached download icon - + BibTeX download icon @@ -6733,7 +6733,7 @@ Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorshi Cached download icon - + BibTeX download icon @@ -6761,7 +6761,7 @@ Self-Censorship on Facebook Cached download icon - + BibTeX download icon @@ -7437,7 +7437,7 @@ Technical analysis of the Ultrasurf proxying software Cached download icon - + BibTeX download icon @@ -8589,7 +8589,7 @@ A terminology for talking about privacy by data minimization: Anonymity, Unlinka Cached download icon - + BibTeX download icon @@ -8703,7 +8703,7 @@ On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking r Cached download icon - + BibTeX download icon @@ -8933,7 +8933,7 @@ Investigating large-scale Internet content filtering Cached download icon - + BibTeX download icon @@ -9135,7 +9135,7 @@ Government mandated blocking of foreign Web content Cached download icon - + BibTeX download icon