-
1
-
-
0017996760
-
Time, Clocks, and the Ordering of Events in a Distributed System
-
July
-
L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, vol. 21, no. 7, pp. 558-565, July 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
2
-
-
0004145058
-
-
Secure Networks, Inc., Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6, Tech. Rep., [Online]. Available: citeseer.ist.psu.edu/ ptacek98insertion.html
-
T. H. Ptacek and T. N. Newsham, "Insertion, evasion, and denial of service: Eluding network intrusion detection," Secure Networks, Inc., Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6, Tech. Rep., 1998. [Online]. Available: citeseer.ist.psu.edu/ptacek98insertion.html
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
3
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Berkeley, CA, USA: USENIX Association
-
V. Paxson, "Bro: a system for detecting network intruders in real-time," in SSYM'98: Proceedings of the 7th conference on USENIX Security Symposium, 1998. Berkeley, CA, USA: USENIX Association, 1998, pp. 3-3.
-
(1998)
SSYM'98: Proceedings of the 7th Conference on USENIX Security Symposium, 1998
, pp. 3-3
-
-
Paxson, V.1
-
4
-
-
0038825042
-
Active mapping: Resisting nids evasion without altering traffic
-
Washington, DC, USA: IEEE Computer Society
-
U. Shankar and V. Paxson, "Active mapping: Resisting nids evasion without altering traffic," in SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2003, p. 44.
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 44
-
-
Shankar, U.1
Paxson, V.2
-
6
-
-
84887546210
-
-
Mr. Investigative report sponsored nu Reporters Without Borders and Chinese Human Rights Defenders, Oct
-
Mr. Tao, "China: Journey to the heart of Internet censorship," Investigative report sponsored nu Reporters Without Borders and Chinese Human Rights Defenders, Oct 2007.
-
(2007)
China: Journey to the Heart of Internet Censorship
-
-
Tao1
-
7
-
-
77955864958
-
-
Whitepaper Released by the Global Internet Freedom Consortium in December of
-
"The Great Firewall Revealed," Whitepaper released by the Global Internet Freedom Consortium in December of 2002.
-
(2002)
The Great Firewall Revealed
-
-
-
8
-
-
80053163341
-
Ignoring the great firewall of china
-
R. Clayton, S. J. Murdoch, and R. N. M. Watson, "Ignoring the great firewall of china," I/S: A Journal of Law and Policy for the Information Society, vol. 3, no. 2, pp. 70-77, 2007.
-
(2007)
I/S: A Journal of Law and Policy for the Information Society
, vol.3
, Issue.2
, pp. 70-77
-
-
Clayton, R.1
Murdoch, S.J.2
Watson, R.N.M.3
-
10
-
-
74049132005
-
ConceptDoppler: A weather tracker for Internet censorship
-
J. R. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East, "ConceptDoppler: a weather tracker for Internet censorship," in Proc. of 14th ACM Conference on Computer and Communications Security (CCS), 2007.
-
Proc. of 14th ACM Conference on Computer and Communications Security (CCS), 2007
-
-
Crandall, J.R.1
Zinn, D.2
Byrd, M.3
Barr, E.4
East, R.5
-
11
-
-
77955865278
-
-
Country profile
-
The Open Net Initiative (http://opennet.net), "China (including Hong Kong)," Country profile.
-
China (Including Hong Kong)
-
-
-
12
-
-
0037363021
-
Internet filtering in China
-
J. Zittrain and B. Edelman, "Internet filtering in China," IEEE Internet Computing, vol. 7, no. 2, pp. 70-77, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Zittrain, J.1
Edelman, B.2
-
13
-
-
73049111426
-
The Connection Has Been Reset
-
March
-
J. Fallows, "The Connection Has Been Reset," Atlantic Monthly, March 2008.
-
(2008)
Atlantic Monthly
-
-
Fallows, J.1
-
14
-
-
0002990537
-
End-to-end routing behavior in the Internet
-
V. Paxson, "End-to-end routing behavior in the Internet," in SIGCOMM '96, 1996.
-
(1996)
SIGCOMM '96
-
-
Paxson, V.1
-
15
-
-
77955861582
-
-
"Scapy (Home Page)," http://www.secdev.org/projects/scapy/.
-
Scapy (Home Page)
-
-
-
17
-
-
49049104900
-
-
RFC 1858 (Informational), Oct. updated by RFC 3128. [Online]. Available
-
G. Ziemba, D. Reed, and P. Traina, "Security Considerations for IP Fragment Filtering," RFC 1858 (Informational), Oct. 1995, updated by RFC 3128. [Online]. Available: http://www.ietf.org/rfc/rfc1858.txt
-
(1995)
Security Considerations for IP Fragment Filtering
-
-
Ziemba, G.1
Reed, D.2
Traina, P.3
-
19
-
-
31844442325
-
An analysis of tcp reset behaviour on the internet
-
M. Arlitt and C. Williamson, "An analysis of tcp reset behaviour on the internet," SIGCOMM Comput. Commun. Rev., vol. 35, no. 1, pp. 37-44, 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.1
, pp. 37-44
-
-
Arlitt, M.1
Williamson, C.2
-
20
-
-
85180628784
-
Detecting forged TCP reset packets
-
The Internet Society
-
N. Weaver, R. Sommer, and V. Paxson, "Detecting forged TCP reset packets," in Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA. The Internet Society, 2009.
-
(2009)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA
-
-
Weaver, N.1
Sommer, R.2
Paxson, V.3
-
21
-
-
52049111419
-
-
The MIT Press
-
R. J. Deibert, J. G. Palfrey, R. Rohozinski, and J. Zittrain, "Access denied: The practice and policy of global internet filtering," The MIT Press, 2007.
-
(2007)
Access Denied: The Practice and Policy of Global Internet Filtering
-
-
Deibert, R.J.1
Palfrey, J.G.2
Rohozinski, R.3
Zittrain, J.4
-
23
-
-
33746066797
-
Failures in a hybrid content blocking system
-
R. Clayton, "Failures in a hybrid content blocking system." in Privacy Enhancing Technologies, 2005, pp. 78-92.
-
(2005)
Privacy Enhancing Technologies
, pp. 78-92
-
-
Clayton, R.1
-
24
-
-
85135257041
-
Government mandated blocking of foreign web content
-
Security, E-Learning, E-Services: Proceedings of the 17. DFN-Arbeitstagung über Kommunikationsnetze, ser. J. von Knop, W. Haverkamp, and E. Jessen, Eds., [Online]. Available: citeseer.ist.psu.edu/ dornseif03government.html
-
M. Dornseif, "Government mandated blocking of foreign web content," in Security, E-Learning, E-Services: Proceedings of the 17. DFN-Arbeitstagung über Kommunikationsnetze, ser. Lecture Notes in Informatics, J. von Knop, W. Haverkamp, and E. Jessen, Eds., 2003, pp. 617-648. [Online]. Available: citeseer.ist.psu.edu/dornseif03government.html
-
(2003)
Lecture Notes in Informatics
, pp. 617-648
-
-
Dornseif, M.1
-
25
-
-
14744271851
-
The economics of resisting censorship
-
G. Danezis and R. Anderson, "The economics of resisting censorship," IEEE Security and Privacy, vol. 3, no. 1, pp. 45-50, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 45-50
-
-
Danezis, G.1
Anderson, R.2
-
26
-
-
77955861935
-
"Good" worms and human rights
-
J. Aycock and A. Maurushat, ""good" worms and human rights," SIGCAS Comput. Soc., vol. 38, no. 1, pp. 28-39, 2008.
-
(2008)
SIGCAS Comput. Soc.
, vol.38
, Issue.1
, pp. 28-39
-
-
Aycock, J.1
Maurushat, A.2
-
27
-
-
62949106453
-
Technological dimensions of privacy in Asia
-
November
-
J. D. Tygar, "Technological dimensions of privacy in Asia," Asia-Pacific Review, Volume 10, Issue 2, November 2003, pages 120-145.
-
(2003)
Asia-Pacific Review
, vol.10
, Issue.2
, pp. 120-145
-
-
Tygar, J.D.1
-
28
-
-
84895349534
-
"Race to the Bottom": Corporate Complicity in Chinese Internet Censorship
-
August
-
""Race to the Bottom": Corporate Complicity in Chinese Internet Censorship," in Human Rights Watch, August 2006, http://www.hrw. org/reports/2006/china0806.
-
(2006)
Human Rights Watch
-
-
-
29
-
-
61049133934
-
Red light, green light: Has China achieved its goals through the 2000 Internet regulations?
-
C. Liang, "Red light, green light: has China achieved its goals through the 2000 Internet regulations?" Vanderbilt Journal of Transnational Law, vol. 345, 2001.
-
(2001)
Vanderbilt Journal of Transnational Law
, vol.345
-
-
Liang, C.1
-
32
-
-
77955856486
-
-
R. D. et al, "Psiphon," http://psiphon.civisec.org/.
-
Psiphon
-
-
D, R.1
-
33
-
-
84897477528
-
Pass it on: Social networks stymie censors
-
Y. Sovran, A. Libonati, and J. Li, "Pass it on: Social networks stymie censors," in Proceedings of the 7th International Workshop on Peer-to- Peer Systems (IPTPS '08), Feb 2008, 2008.
-
Proceedings of the 7th International Workshop on Peer-to- Peer Systems (IPTPS '08), Feb 2008, 2008
-
-
Sovran, Y.1
Libonati, A.2
Li, J.3
-
34
-
-
85084161295
-
Infranet: Circumventing Web Censorship and Surveillance
-
Available
-
N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger, "Infranet: Circumventing Web Censorship and Surveillance," in 11th USENIX Security Symposium, San Francisco, CA, August 2002. [Online]. Available: http://wind.lcs.mit.edu/papers/
-
11th USENIX Security Symposium, San Francisco, CA, August 2002. [Online]
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
35
-
-
84968779644
-
Censorship resistant peer-to-peer content addressable networks
-
Philadelphia, PA, USA: Society for Industrial and Applied Mathematics
-
A. Fiat and J. Saia, "Censorship resistant peer-to-peer content addressable networks," in SODA '02: Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 2002, pp. 94-103.
-
(2002)
SODA '02: Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 94-103
-
-
Fiat, A.1
Saia, J.2
|