mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-25 15:35:55 -04:00
Add two USENIX Security'18 papers.
This commit is contained in:
parent
91d12bd100
commit
bc6a324f07
3 changed files with 23 additions and 1 deletions
|
@ -1,3 +1,7 @@
|
||||||
|
* 2018-08-21
|
||||||
|
- Added paper ``Effective Detection of Multimedia Protocol Tunneling using Machine Learning''
|
||||||
|
- Added paper ``Quack: Scalable Remote Measurement of Application-Layer Censorship''
|
||||||
|
|
||||||
* 2018-08-20
|
* 2018-08-20
|
||||||
- Added paper ``Analyzing China's Blocking of Unpublished Tor Bridges''
|
- Added paper ``Analyzing China's Blocking of Unpublished Tor Bridges''
|
||||||
- Added paper ``MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption''
|
- Added paper ``MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption''
|
||||||
|
|
|
@ -83,7 +83,7 @@
|
||||||
(<a href="author_reverse.html">reverse</a>) <a href="author.html">author</a> <br />
|
(<a href="author_reverse.html">reverse</a>) <a href="author.html">author</a> <br />
|
||||||
Feedback: <a href="mailto:phw@nymity.ch">phw@nymity.ch</a> (<a
|
Feedback: <a href="mailto:phw@nymity.ch">phw@nymity.ch</a> (<a
|
||||||
href="https://nymity.ch/openpgp_public_key.txt">OpenPGP</a>) <br />
|
href="https://nymity.ch/openpgp_public_key.txt">OpenPGP</a>) <br />
|
||||||
Last updated: <a href="Changelog.txt">2018-08-20</a> <br />
|
Last updated: <a href="Changelog.txt">2018-08-21</a> <br />
|
||||||
Onion site: <a href="http://3wcwjjnuvjyazeza.onion">3wcwjjnuvjyazeza.onion</a> <br />
|
Onion site: <a href="http://3wcwjjnuvjyazeza.onion">3wcwjjnuvjyazeza.onion</a> <br />
|
||||||
Code: <a href="https://github.com/NullHypothesis/censorbib">GitHub</a>
|
Code: <a href="https://github.com/NullHypothesis/censorbib">GitHub</a>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -1,3 +1,21 @@
|
||||||
|
@inproceedings{Barradas2018a,
|
||||||
|
author = {Diogo Barradas and Nuno Santos and Lu\'{i}s Rodrigues},
|
||||||
|
title = {Effective Detection of Multimedia Protocol Tunneling using Machine Learning},
|
||||||
|
booktitle = {USENIX Security Symposium},
|
||||||
|
publisher = {USENIX},
|
||||||
|
year = {2018},
|
||||||
|
url = {https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-barradas.pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
@inproceedings{VanderSloot2018a,
|
||||||
|
author = {Benjamin VanderSloot and Allison McDonald and Will Scott and J. Alex Halderman and Roya Ensafi},
|
||||||
|
title = {{Quack}: Scalable Remote Measurement of Application-Layer Censorship},
|
||||||
|
booktitle = {USENIX Security Symposium},
|
||||||
|
publisher = {USENIX},
|
||||||
|
year = {2018},
|
||||||
|
url = {https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-vandersloot.pdf},
|
||||||
|
}
|
||||||
|
|
||||||
@inproceedings{Nisar2018a,
|
@inproceedings{Nisar2018a,
|
||||||
author = {Aqib Nisar and Aqsa Kashaf and Ihsan Ayyub Qazi and Zartash Afzal Uzmi},
|
author = {Aqib Nisar and Aqsa Kashaf and Ihsan Ayyub Qazi and Zartash Afzal Uzmi},
|
||||||
title = {Incentivizing Censorship Measurements via Circumvention},
|
title = {Incentivizing Censorship Measurements via Circumvention},
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue