mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-22 22:21:15 -04:00
Deploying to gh-pages from @ NullHypothesis/censorbib@01c672f6b8 🚀
This commit is contained in:
parent
e2fc5a2e75
commit
c8827c4669
1 changed files with 24 additions and 24 deletions
48
index.html
48
index.html
|
@ -185,7 +185,7 @@
|
|||
</div>
|
||||
<div class="menu-item">
|
||||
<img class="top-icon" src="assets/update-icon.svg" alt="update icon">
|
||||
<a href="https://github.com/NullHypothesis/censorbib/commits/master">Updated: 2024-11-05</a>
|
||||
<a href="https://github.com/NullHypothesis/censorbib/commits/master">Updated: 2024-11-30</a>
|
||||
</div>
|
||||
</div> <!-- censorbib-links -->
|
||||
|
||||
|
@ -2702,7 +2702,7 @@ In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2021, USENIX
|
|||
Your Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://www.cs.umd.edu/~dml/papers/weaponizing_woot21.pdf'>
|
||||
<a href='https://www.cs.umd.edu/~dml/papers/weaponizing_woot21.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Bock2021a.pdf'>
|
||||
|
@ -3798,7 +3798,7 @@ In Proc. of: <span class="venue">Web Science</span>, 2018, ACM
|
|||
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://delivery.acm.org/10.1145/3280000/3278555/p252-Yadav.pdf'>
|
||||
<a href='https://delivery.acm.org/10.1145/3280000/3278555/p252-Yadav.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Yadav2018a.pdf'>
|
||||
|
@ -3826,7 +3826,7 @@ In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2018, A
|
|||
403 Forbidden: A Global View of CDN Geoblocking
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://delivery.acm.org/10.1145/3280000/3278552/p218-McDonald.pdf'>
|
||||
<a href='https://delivery.acm.org/10.1145/3280000/3278552/p218-McDonald.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/McDonald2018a.pdf'>
|
||||
|
@ -4139,7 +4139,7 @@ In Proc. of: <span class="venue">Free and Open Communications on the Internet</s
|
|||
How Sudden Censorship Can Increase Access to Information
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://www.margaretroberts.net/wp-content/uploads/2016/08/selfiecensorship.pdf'>
|
||||
<a href='https://www.margaretroberts.net/wp-content/uploads/2016/08/selfiecensorship.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Hobbs2018a.pdf'>
|
||||
|
@ -4505,7 +4505,7 @@ In Proc. of: <span class="venue">Computer and Communications Security</span>, 20
|
|||
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://www.cs.ucr.edu/~krish/imc17.pdf'>
|
||||
<a href='https://www.cs.ucr.edu/~krish/imc17.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Wang2017a.pdf'>
|
||||
|
@ -4645,7 +4645,7 @@ In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2017, USENIX
|
|||
FilteredWeb: A Framework for the Automated Search-Based Discovery of Blocked URLs
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma2017_paper32.pdf'>
|
||||
<a href='https://tma.ifip.org/wordpress/wp-content/uploads/2017/06/tma2017_paper32.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Darer2017a.pdf'>
|
||||
|
@ -5715,7 +5715,7 @@ In Proc. of: <span class="venue">International Conference on Web and Social Medi
|
|||
A Case for Marrying Censorship Measurements with Circumvention
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/hotnets/2015/papers/nisar.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/hotnets/2015/papers/nisar.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Nisar2015a.pdf'>
|
||||
|
@ -5743,7 +5743,7 @@ In Proc. of: <span class="venue">Hot Topics in Networks</span>, 2015, ACM
|
|||
Can Censorship Measurements Be Safe(r)?
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/hotnets/2015/papers/jones.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/hotnets/2015/papers/jones.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Jones2015b.pdf'>
|
||||
|
@ -5828,7 +5828,7 @@ Examining How the Great Firewall Discovers Hidden Circumvention Servers
|
|||
</span>
|
||||
<span class="icons">
|
||||
<a href='https://github.com/net4people/bbs/issues/208'><img class="icon" title="Online discussion" src="assets/discussion-icon.svg" alt="Discussion icon"></a>
|
||||
<a href='http://conferences2.sigcomm.org/imc/2015/papers/p445.pdf'>
|
||||
<a href='https://conferences2.sigcomm.org/imc/2015/papers/p445.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Ensafi2015b.pdf'>
|
||||
|
@ -5884,7 +5884,7 @@ In Proc. of: <span class="venue">Computer and Communications Security</span>, 20
|
|||
Seeing through Network-Protocol Obfuscation
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf'>
|
||||
<a href='https://pages.cs.wisc.edu/~liangw/pub/ccsfp653-wangA.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Wang2015a.pdf'>
|
||||
|
@ -6052,7 +6052,7 @@ In Proc. of: <span class="venue">USENIX Security Symposium</span>, 2015, USENIX
|
|||
Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p653.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/sigcomm/2015/pdf/papers/p653.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Burnett2015a.pdf'>
|
||||
|
@ -6362,7 +6362,7 @@ In Proc. of: <span class="venue">Privacy Enhancing Technologies Symposium</span>
|
|||
Censorship in the Wild: Analyzing Internet Filtering in Syria
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences2.sigcomm.org/imc/2014/papers/p285.pdf'>
|
||||
<a href='https://conferences2.sigcomm.org/imc/2014/papers/p285.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Chaabane2014a.pdf'>
|
||||
|
@ -6446,7 +6446,7 @@ In Proc. of: <span class="venue">Passive and Active Measurement Conference</span
|
|||
No Direction Home: The True Cost of Routing Around Decoys
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://dedis.cs.yale.edu/dissent/papers/nodirection.pdf'>
|
||||
<a href='https://dedis.cs.yale.edu/dissent/papers/nodirection.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Houmansadr2014a.pdf'>
|
||||
|
@ -6502,7 +6502,7 @@ In Proc. of: <span class="venue">Free and Open Communications on the Internet</s
|
|||
Automated Detection and Fingerprinting of Censorship Block Pages
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences2.sigcomm.org/imc/2014/papers/p299.pdf'>
|
||||
<a href='https://conferences2.sigcomm.org/imc/2014/papers/p299.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Jones2014b.pdf'>
|
||||
|
@ -6530,7 +6530,7 @@ In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2014, A
|
|||
A Look at the Consequences of Internet Censorship Through an ISP Lens
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences2.sigcomm.org/imc/2014/papers/p271.pdf'>
|
||||
<a href='https://conferences2.sigcomm.org/imc/2014/papers/p271.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Khattak2014a.pdf'>
|
||||
|
@ -6981,7 +6981,7 @@ In Proc. of: <span class="venue">Conference on Online Social Networks</span>, 20
|
|||
A Method for Identifying and Confirming the Use of URL Filtering Products for Censorship
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Dalek2013a.pdf'>
|
||||
|
@ -7009,7 +7009,7 @@ In Proc. of: <span class="venue">Internet Measurement Conference</span>, 2013, A
|
|||
Revealing Middlebox Interference with Tracebox
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Detal2013a.pdf'>
|
||||
|
@ -7600,7 +7600,7 @@ Collin Anderson
|
|||
The Collateral Damage of Internet Censorship by DNS Injection
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/sigcomm/2012/paper/ccr-paper266.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Sparks2012a.pdf'>
|
||||
|
@ -7628,7 +7628,7 @@ In: <span class="venue">SIGCOMM Computer Communication Review</span>, 2012, ACM
|
|||
Hold-On: Protecting Against On-Path DNS Poisoning
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='https://www.cs.albany.edu/~mariya/courses/csi516F19/papers/holdon.pdf'>
|
||||
<a href='https://www.icir.org/vern/papers/hold-on.satin12.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Duan2012a.pdf'>
|
||||
|
@ -8190,7 +8190,7 @@ In Proc. of: <span class="venue">Security Protocols</span>, 2011, Springer
|
|||
Analysis of Country-wide Internet Outages Caused by Censorship
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/imc/2011/docs/p1.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/imc/2011/docs/p1.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Dainotti2011a.pdf'>
|
||||
|
@ -8386,7 +8386,7 @@ In Proc. of: <span class="venue">Free and Open Communications on the Internet</s
|
|||
Tor Instead of IP
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf'>
|
||||
<a href='https://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Liu2011a.pdf'>
|
||||
|
@ -8554,7 +8554,7 @@ In Proc. of: <span class="venue">CHI</span>, 2011, ACM
|
|||
Dust: A Blocking-Resistant Internet Transport Protocol
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://censorbib.nymity.ch/pdf/Wiley2011a.pdf'>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Wiley2011a.pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Wiley2011a.pdf'>
|
||||
|
@ -9012,7 +9012,7 @@ Graham Lowe, Patrick Winters, Michael L. Marcus
|
|||
Investigating large-scale Internet content filtering
|
||||
</span>
|
||||
<span class="icons">
|
||||
<a href='http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.133.5778&rep=rep1&type=pdf'>
|
||||
<a href='https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.133.5778&rep=rep1&type=pdf'>
|
||||
<img class="icon" title="Download paper" src="assets/pdf-icon.svg" alt="Download icon">
|
||||
</a>
|
||||
<a href='https://censorbib.nymity.ch/pdf/Wolfgarten2006a.pdf'>
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue