mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-20 21:29:03 -04:00
Merge branch 'master' into master
This commit is contained in:
commit
a6cef88fa5
1 changed files with 52 additions and 0 deletions
|
@ -9,6 +9,58 @@
|
|||
url = {https://pubs.aeaweb.org/doi/pdfplus/10.1257/aer.20171765},
|
||||
}
|
||||
|
||||
@techreport{Ptacek1998a,
|
||||
author = {Thomas H. Ptacek and Timothy N. Newsham},
|
||||
title = {Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection},
|
||||
year = {1998},
|
||||
url = {https://www.icir.org/vern/Ptacek-Newsham-Evasion-98.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Handley2001a,
|
||||
author = {Mark Handley and Vern Paxson and Christian Kreibich},
|
||||
title = {Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics},
|
||||
booktitle = {USENIX Security Symposium},
|
||||
publisher = {USENIX},
|
||||
year = {2001},
|
||||
url = {https://www.usenix.org/legacy/events/sec01/full_papers/handley/handley.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Wu2025a,
|
||||
author = {Mingshi Wu and Ali Zohaib and Zakir Durumeric and Amir Houmansadr and Eric Wustrow},
|
||||
title = {A Wall Behind A Wall: Emerging Regional Censorship in {China}},
|
||||
booktitle = {Symposium on Security \& Privacy},
|
||||
publisher = {IEEE},
|
||||
year = {2025},
|
||||
url = {https://gfw.report/publications/sp25/data/paper/paper.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Vafa2025a,
|
||||
author = {Elham Pourabbas Vafa and Mohit Singhal and Poojitha Thota and Sayak Saha Roy},
|
||||
title = {Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies},
|
||||
booktitle = {Symposium on Security \& Privacy},
|
||||
publisher = {IEEE},
|
||||
year = {2025},
|
||||
url = {https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/21B7R7E8URG/pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Niere2025a,
|
||||
author = {Niklas Niere and Felix Lange and Robert Merget and Juraj Somorovsky},
|
||||
title = {Transport Layer Obscurity: Circumventing {SNI} Censorship on the {TLS} Layer},
|
||||
booktitle = {Symposium on Security \& Privacy},
|
||||
publisher = {IEEE},
|
||||
year = {2025},
|
||||
url = {https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/26hiUekZ19S/pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Nourin2025a,
|
||||
author = {Sadia Nourin and Erik Rye and Kevin Bock and Nguyen Phong Hoang and Dave Levin},
|
||||
title = {Is Nobody There? Good! Globally Measuring Connection Tampering without Responsive Endhosts},
|
||||
booktitle = {Symposium on Security \& Privacy},
|
||||
publisher = {IEEE},
|
||||
year = {2025},
|
||||
url = {https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/26hiUgw654A/pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Fan2025a,
|
||||
author = {Shencha Fan and Jackson Sippe and Sakamoto San and Jade Sheffey and David Fifield and Amir Houmansadr and Elson Wedwards and Eric Wustrow},
|
||||
title = {{Wallbleed}: A Memory Disclosure Vulnerability in the {Great Firewall} of {China}},
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue