-
1
-
-
85024278538
-
-
“Angry Shoes.” Flickr; http://www.flickr.com/photos/isaacmao/5738596950/.
-
“Angry Shoes.” Flickr
-
-
-
2
-
-
84872966921
-
The collateral damage of Internet censorship by DNS injection
-
Anonymous. 2012. The collateral damage of Internet censorship by DNS injection. ACM SIGCOMM Computer Communication Review 42(3): 21–27.
-
(2012)
ACM SIGCOMM Computer Communication Review
, vol.42
, Issue.3
, pp. 21-27
-
-
Anonymous1
-
3
-
-
84872951322
-
-
Brown, M. A., Madory, D., Popescu, A., Zmijewski, E. 2010. DNS tampering and root servers; http://www.renesys.com/tech/presentations/pdf/DNS-Tampering-and-Root-Servers.pdf.
-
(2010)
DNS tampering and root servers
-
-
Brown, M.A.1
Madory, D.2
Popescu, A.3
Zmijewski, E.4
-
4
-
-
8844239033
-
Architecture of intrusion detection for high-speed networks
-
(September)
-
Chen, X., Fang, B., Li, L. Architecture of intrusion detection for high-speed networks. 2004. Journal of Computer Research and Development 41 (September): 1481–1487.
-
(2004)
Journal of Computer Research and Development
, vol.41
, pp. 1481-1487
-
-
Chen, X.1
Fang, B.2
Li, L.3
-
5
-
-
84881532082
-
-
China Internet Network Information Center. 2012. 29th Statistical Report on Internet Development in China; http://www.apira.org/data/upload/The29thStatisticalReportonInter1netDevelopmentinChina_P9G97q.pdf.
-
(2012)
29th Statistical Report on Internet Development in China
-
-
-
6
-
-
79955607912
-
-
China's great firewall designer “hit by shoe.” 2011. BBC News Asia-Pacific; http://www.bbc.co.uk/news/world-asia-pacific-13455819.
-
(2011)
BBC News Asia-Pacific
-
-
-
7
-
-
84900159515
-
-
Internet censorship in China
-
Chovanec, P. 2011. Al Jazeera: Internet censorship in China; http://chovanec.wordpress.com/2010/01/02/al-jazeera-internet-censorship-in-china/.
-
(2011)
Al Jazeera
-
-
Chovanec, P.1
-
9
-
-
85024283851
-
-
ConceptDoppler; http://www.conceptdoppler.org.
-
ConceptDoppler
-
-
-
10
-
-
74049132005
-
ConceptDoppler: A weather tracker for Internet censorship
-
Crandall, J., Zinn, D., Byrd, M., Barr, E., East, R. 2007. ConceptDoppler: A weather tracker for Internet censorship. In Proceedings of the 14th ACM Conference on Computer and Communications Security: 1–4.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 1-4
-
-
Crandall, J.1
Zinn, D.2
Byrd, M.3
Barr, E.4
East, R.5
-
12
-
-
77951184167
-
-
The Shaping of Power, Rights, and Rule in Cyberspace. MIT Press: 264
-
Deibert, R., Palfrey, J. G., Initiative, O., Rohozinski, R., Zittrain, J. 2010. Access Controlled. The Shaping of Power, Rights, and Rule in Cyberspace. MIT Press: 264.
-
(2010)
Access Controlled.
-
-
Deibert, R.1
Palfrey, J.G.2
Initiative, O.3
Rohozinski, R.4
Zittrain, J.5
-
14
-
-
85024247000
-
-
(in Chinese)
-
History of GFW and Binxing Fang. (in Chinese) 2010; https://fangbinxing.appspot.com/2010/08/10/fangbingxing.html.
-
(2010)
History of GFW and Binxing Fang
-
-
-
16
-
-
85024269102
-
A control method for large-scale network based on routing diffusion
-
Liu, G., Yun, X., Fang, B., Hu, M. 2003. A control method for large-scale network based on routing diffusion. Journal of China Institute of Communications: 10.
-
(2003)
Journal of China Institute of Communications
, pp. 10
-
-
Liu, G.1
Yun, X.2
Fang, B.3
Hu, M.4
-
20
-
-
85024244925
-
-
Smith, J. R. 2011; https://twitter.com/#!/TheRealJRSmith/statuses/128181662222794752.
-
(2011)
-
-
Smith, J.R.1
-
21
-
-
85024286404
-
Chinese ISP hijacks the Internet
-
Toonk, A. 2010. Chinese ISP hijacks the Internet. BGPmon; http://bgpmon.net/blog/?p=282.
-
(2010)
BGPmon
-
-
Toonk, A.1
-
22
-
-
84881243603
-
-
Ticket #4185. Tor Bug Tracker Wiki (October)
-
Tor. 2011. Bridge easily detected by GFW. Ticket #4185. Tor Bug Tracker Wiki (October); https:// trac.torproject.org/projects/tor/ticket/4185.
-
(2011)
Bridge easily detected by GFW.
-
-
Tor1
-
23
-
-
85024260887
-
-
Tor obfsproxy; https://www.torproject.org/projects/obfsproxy.html.en.
-
Tor obfsproxy
-
-
-
24
-
-
85024282683
-
-
U.S.-China Economic and Security Review Commission. 2010. Report to Congress: 241; http://www.uscc.gov/annual_report/2010/annual_report_full_10.pdf.
-
(2010)
Report to Congress
, pp. 241
-
-
-
26
-
-
85024277336
-
China blocks MIT Web addresses
-
Winstein, K. J. 2002. China blocks MIT Web addresses. The Tech 122(58); http://tech.mit.edu/V122/N58/58web.58n.html.
-
(2002)
The Tech
, vol.122
, Issue.58
-
-
Winstein, K.J.1
-
27
-
-
33846178631
-
Detection and defense of DNS spoofing attack
-
Yan, B., Fang, B., Li, B., Wang, Y. 2006. Detection and defense of DNS spoofing attack. Computer Engineering 32(21).
-
(2006)
Computer Engineering
, vol.32
, Issue.21
-
-
Yan, B.1
Fang, B.2
Li, B.3
Wang, Y.4
-
28
-
-
2942549268
-
A parallel cluster intrusion-detection system for backbone network
-
Yang, W., Fang, B., Yun, X., Zhang, H. 2004. A parallel cluster intrusion-detection system for backbone network. Journal of Harbin Institute of Technology 3.
-
(2004)
Journal of Harbin Institute of Technology
, pp. 3
-
-
Yang, W.1
Fang, B.2
Yun, X.3
Zhang, H.4
|