Censorship in the wild: Analyzing Internet filtering in Syria

A Chaabane, T Chen, M Cunche… - Proceedings of the …, 2014 - dl.acm.org
Internet censorship is enforced by numerous governments worldwide, however, due to the
lack of publicly available information, as well as the inherent risks of performing active …

Sok: Towards grounding censorship circumvention in empiricism

MC Tschantz, S Afroz, V Paxson - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Effective evaluations of approaches to circumventing government Internet censorship
require incorporating perspectives of how censors operate in practice. We undertake an …

The emergence of contention in global Internet governance

S Bradshaw, L DeNardis, FO Hampson… - Global Commission …, 2015 - papers.ssrn.com
Internet governance has rapidly shifted from a technocratic area of governance to one
characterized by considerable contention. This shift is unprecedented among the large and …

Automated detection and fingerprinting of censorship block pages

B Jones, TW Lee, N Feamster, P Gill - … of the 2014 Conference on Internet …, 2014 - dl.acm.org
One means of enforcing Web censorship is to return a block page, which informs the user
that an attempt to access a webpage is unsuccessful. Detecting block pages can provide a …

The humanitarian cyberspace: shrinking space or an expanding frontier?

KB Sandvik - Third World Quarterly, 2016 - Taylor & Francis
In an effort to contribute to a more critical understanding of the role of information and
communication technology (ICT) in humanitarian action, this article explores the topography …

[图书][B] Routledge companion to global cyber-security strategy

SN Romaniuk, M Manjikian - 2021 - books.google.com
This companion provides the most comprehensive and up-to-date comparative overview of
the cyber-security strategies and doctrines of the major states and actors in Europe, North …

[PDF][PDF] Manipulating uncertainty: Cybersecurity politics in Egypt

B Hassib, J Shires - Journal of Cybersecurity, 2021 - academic.oup.com
Cybersecurity, defined as the prevention and mitigation of malicious interference with digital
devices and networks, is a key area of contest for digitalized politics, especially in uncertain …

[图书][B] Cyber threat: The rise of information geopolitics in us national security

C Bronk - 2016 - books.google.com
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the
past decade, utilizing recent events to explain the international security dimension of cyber …

Fingerprint verification using Gabor co-occurrence features

S Arivazhagan, TGA Flora… - International Conference …, 2007 - ieeexplore.ieee.org
The biometric techniques based on face, iris and fingerprints are used in order to provide
strong security. Out of which, Fingerprint identification effects far more positive identifications …

[图书][B] The new cyberwar: Technology and the redefinition of warfare

DF Poindexter - 2015 - books.google.com
Carl Von Clausewitz described the purpose of war as" the compulsory submission of the
enemy to our will." Unlike conventional military conflicts of the past, war in the information …