Censorship in the wild: Analyzing Internet filtering in Syria
Internet censorship is enforced by numerous governments worldwide, however, due to the
lack of publicly available information, as well as the inherent risks of performing active …
lack of publicly available information, as well as the inherent risks of performing active …
Sok: Towards grounding censorship circumvention in empiricism
Effective evaluations of approaches to circumventing government Internet censorship
require incorporating perspectives of how censors operate in practice. We undertake an …
require incorporating perspectives of how censors operate in practice. We undertake an …
The emergence of contention in global Internet governance
Internet governance has rapidly shifted from a technocratic area of governance to one
characterized by considerable contention. This shift is unprecedented among the large and …
characterized by considerable contention. This shift is unprecedented among the large and …
Automated detection and fingerprinting of censorship block pages
One means of enforcing Web censorship is to return a block page, which informs the user
that an attempt to access a webpage is unsuccessful. Detecting block pages can provide a …
that an attempt to access a webpage is unsuccessful. Detecting block pages can provide a …
The humanitarian cyberspace: shrinking space or an expanding frontier?
KB Sandvik - Third World Quarterly, 2016 - Taylor & Francis
In an effort to contribute to a more critical understanding of the role of information and
communication technology (ICT) in humanitarian action, this article explores the topography …
communication technology (ICT) in humanitarian action, this article explores the topography …
[图书][B] Routledge companion to global cyber-security strategy
SN Romaniuk, M Manjikian - 2021 - books.google.com
This companion provides the most comprehensive and up-to-date comparative overview of
the cyber-security strategies and doctrines of the major states and actors in Europe, North …
the cyber-security strategies and doctrines of the major states and actors in Europe, North …
[PDF][PDF] Manipulating uncertainty: Cybersecurity politics in Egypt
Cybersecurity, defined as the prevention and mitigation of malicious interference with digital
devices and networks, is a key area of contest for digitalized politics, especially in uncertain …
devices and networks, is a key area of contest for digitalized politics, especially in uncertain …
[图书][B] Cyber threat: The rise of information geopolitics in us national security
C Bronk - 2016 - books.google.com
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the
past decade, utilizing recent events to explain the international security dimension of cyber …
past decade, utilizing recent events to explain the international security dimension of cyber …
Fingerprint verification using Gabor co-occurrence features
S Arivazhagan, TGA Flora… - International Conference …, 2007 - ieeexplore.ieee.org
The biometric techniques based on face, iris and fingerprints are used in order to provide
strong security. Out of which, Fingerprint identification effects far more positive identifications …
strong security. Out of which, Fingerprint identification effects far more positive identifications …
[图书][B] The new cyberwar: Technology and the redefinition of warfare
DF Poindexter - 2015 - books.google.com
Carl Von Clausewitz described the purpose of war as" the compulsory submission of the
enemy to our will." Unlike conventional military conflicts of the past, war in the information …
enemy to our will." Unlike conventional military conflicts of the past, war in the information …