The end of the net as we know it? Deep packet inspection and internet governance
暂无分享,去创建一个
[1] Jonathan S. Turner,et al. Advanced algorithms for fast and scalable deep packet inspection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.
[2] Tarleton Gillespie. Wired Shut, Copyright and the Shape of Digital Culture , 2009 .
[3] Erwin Danneels. Disruptive Technology Reconsidered: A Critique and Research Agenda , 2004 .
[4] Clayton M. Christensen. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .
[5] Grant A. Jacoby,et al. Blocking Skype through Deep Packet Inspection , 2009 .
[6] F. Scharpf. Games Real Actors Play: Actor-centered Institutionalism In Policy Research , 1997 .
[7] Ryan Singel. Whistle-Blower Outs NSA Spy Room , 2007 .
[8] Renate Mayntz,et al. Die Entwicklung technischer Infrastruktursysteme zwischen Steuerung und Selbstorganisation , 1995 .
[9] Volker Schneider. Staat und technische Kommunikation: Die politische Entwicklung der Telekommunikation in den USA, Japan, Großbritannien, Deutschland, Frankreich und Italien , 1999 .
[10] Mathias Klang. Disruptive Technology: Effects of Technology Regulation on Democracy , 2006 .
[11] Tim Wu,et al. Network Neutrality, Broadband Discrimination , 2003, J. Telecommun. High Technol. Law.
[12] H. Jonathan Chao,et al. Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.
[13] Philip A.E. Brey,et al. Artifacts as Social Agents , 2005 .
[14] Lawrence Lessig,et al. The future of ideas - the fate of the commons in a connected world , 2002 .
[15] Ioannis Sourdis. Designs and algorithms for packet and content inspection , 2007 .
[16] Christoph Knill,et al. Private Actors and the State: Internationalization and Changing Patterns of Governance , 2002 .
[17] Ronald J. Deibert,et al. Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.
[18] Renate Mayntz,et al. Akteurzentrierter Institutionalismus in der Technikforschung: Fragestellungen und Erklärungsansätze , 1995 .
[19] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[20] Jon M. Peha,et al. Dimensions of P2P and digital piracy in a university campus , 2008 .
[21] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[22] Peter Weingart. Großtechnische Systeme Ein Paradigma der Verknüpfung von Technikentwicklung und sozialem Wandel , 1994 .
[23] Ben Wagner. Modifying the Data Stream: Deep Packet Inspection and Internet Censorship , 2008 .
[24] Christopher Rhoads,et al. Iran's Web Spying Aided By Western Technology , 2009 .
[25] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .