At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes
暂无分享,去创建一个
Nils B. Weidmann | Margaret E. Roberts | Philipp M. Lutscher | A. Dainotti | M. Jonker | A. King | Alistair King
[1] Ruben Enikolopov,et al. Social Media and Protest Participation: Evidence from Russia , 2016, Econometrica.
[2] Yuyu Chen,et al. The Impact of Media Censorship: 1984 or Brave New World? , 2019, American Economic Review.
[3] Y. Zhukov,et al. Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events? , 2019 .
[4] Margaret E. Roberts. Censored: Distraction and Diversion Inside China's Great Firewall , 2018 .
[5] Staffan I. Lindberg,et al. Regimes of the World (RoW): Opening New Avenues for the Comparative Study of Political Regimes , 2018 .
[6] Margaret E. Roberts,et al. How Sudden Censorship Can Increase Access to Information , 2017, American Political Science Review.
[7] Alberto Dainotti,et al. Millions of targets under attack: a macroscopic characterization of the DoS ecosystem , 2017, Internet Measurement Conference.
[8] Margaret E. Roberts,et al. From Liberation to Turmoil: Social Media And Democracy , 2017 .
[9] Margaret E. Roberts,et al. How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument , 2017, American Political Science Review.
[10] Arjun S. Wilkins. To Lag or Not to Lag?: Re-Evaluating the Use of Lagged Dependent Variables in Regression Analysis* , 2017, Political Science Research and Methods.
[11] T. Holt,et al. Exploring the Correlates of Individual Willingness to Engage in Ideologically Motivated Cyberattacks , 2017 .
[12] C. Knutsen,et al. Autocratic Elections: Stabilizing Tool or Force for Change? , 2017 .
[13] Tiberiu Dragu. Does Technology Undermine Authoritarian Governments ? , 2017 .
[14] M. Truong,et al. Silencing the messenger: Communication apps under pressure , 2016 .
[15] A. Yildirim. Muslim Democratic Parties in the Middle East: Economy and Politics of Islamist Moderation , 2016 .
[16] Ryan Shirah. Electoral authoritarianism and political unrest , 2016 .
[17] Joseph K. Young,et al. Repression, Education, and Politically Motivated Cyberattacks , 2016 .
[18] Tadayoshi Kohno,et al. Satellite: Joint Analysis of CDNs and Network-Level Interference , 2016, USENIX Annual Technical Conference.
[19] Aiko Pras,et al. A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements , 2016, IEEE Journal on Selected Areas in Communications.
[20] Ulrich Dolata,et al. Masses, Crowds, Communities, Movements: Collective Action in the Internet Age , 2016 .
[21] A. Little. Communication Technology and Protest , 2016, The Journal of Politics.
[22] S. Milan. Hacktivism as a Radical Media Practice , 2015 .
[23] L. Tanczer. Book review: the coming swarm: DDoS actions, hacktivism, and civil disobedience on the internet , 2015 .
[24] Yonatan L. Morse. The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism , 2015 .
[25] Seva Gunitsky. Corrupting the Cyber-Commons: Social Media as a Tool of Autocratic Stability , 2015, Perspectives on Politics.
[26] Vern Paxson,et al. An Analysis of China's "Great Cannon" , 2015 .
[27] Marco Chiesa,et al. Analysis of country-wide internet outages caused by censorship , 2011, IMC '11.
[28] Gabriella Coleman. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2014 .
[29] Adam Senft,et al. Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware , 2014, USENIX Security Symposium.
[30] Jessica L. Beyer. Expect Us: Online Communities and Political Mobilization , 2014 .
[31] B. Valeriano,et al. The dynamics of cyber conflict between rival antagonists, 2001–11 , 2014 .
[32] N. Hassanpour. Media Disruption and Revolutionary Unrest: Evidence From Mubarak's Quasi-Experiment , 2014 .
[33] W. Wong,et al. E-Bandits in Global Activism: WikiLeaks, Anonymous, and the Politics of No One , 2013, Perspectives on Politics.
[34] Andreas Schedler. The Politics of Uncertainty: Sustaining and Subverting Electoral Authoritarianism , 2013 .
[35] Erik Melander,et al. Introducing the UCDP Georeferenced Event Dataset , 2013 .
[36] Margaret E. Roberts,et al. How Censorship in China Allows Government Criticism but Silences Collective Expression , 2013, American Political Science Review.
[37] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[38] A. Little. Elections, Fraud, and Election Monitoring in the Shadow of Revolution , 2012 .
[39] Katy E. Pearce,et al. Networked Authoritarianism and Social Media in Azerbaijan , 2012 .
[40] Dennis M. Murphy. The Net Delusion: The Dark Side of Internet Freedom , 2012 .
[41] Ronald J. Deibert,et al. Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war , 2012 .
[42] R. García. CONSENT OF THE NETWORKED. The Worldwide Struggle for Internet Freedom , 2012 .
[43] Peter Van Aelst,et al. INTERNET AND SOCIAL MOVEMENT ACTION REPERTOIRES , 2010 .
[44] Ronald J. Deibert,et al. Liberation vs. Control: The Future of Cyberspace , 2010 .
[45] J. V. Laer,et al. INTERNET AND SOCIAL MOVEMENT ACTION REPERTOIRES: Opportunities and limitations , 2010 .
[46] L. Diamond. Liberation Technology , 2010 .
[47] Kristian Skrede Gleditsch,et al. The Geography of the International System: The CShapes Dataset , 2010 .
[48] Jeffrey Carr,et al. Inside Cyber Warfare: Mapping the Cyber Underworld , 2009 .
[49] J. Gandhi,et al. Elections Under Authoritarianism , 2009 .
[50] S. Lindberg. Democratization by elections : a new mode of transition , 2009 .
[51] Jose Nazario,et al. Politically Motivated Denial of Service Attacks , 2009 .
[52] Paul Sturges,et al. Access Denied: The Practice and Policy of Global Internet Filtering , 2008 .
[53] Beatriz Magaloni. Credible Power-Sharing and the Longevity of Authoritarian Rule , 2008 .
[54] Joshua A. Tucker. Enough! Electoral Fraud, Collective Action Problems, and Post-Communist Colored Revolutions , 2007, Perspectives on Politics.
[55] Taylor C. Boas. 17 WEAVING THE AUTHORITARIAN WEB The Control of Internet Use in Nondemocratic Regimes , 2006, How Revolutionary Was the Digital Revolution?.
[56] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[57] Lucy Kralj. Access denied. , 2005, Nursing standard (Royal College of Nursing (Great Britain) : 1987).
[58] J. D. McCarthy,et al. The use of newspaper data in the study of collective action , 2003 .
[59] Tim Jordan,et al. Activism!: Direct Action, Hacktivism and the Future of Society , 2004 .
[60] J. Kavanagh. Liberation technology , 1989 .
[61] J. Singer. Reconstructing the correlates of war dataset on material capabilities of states, 1816–1985 , 1988 .