Lost in Transmission: Investigating Filtering of COVID-19 Websites
暂无分享,去创建一个
Roya Ensafi | Ram Sundara Raman | Anjali Vyas | Nick Ceccio | Philipp M. Lutscher | R. Raman | Roya Ensafi | Anjali Vyas | Nick Ceccio
[1] Nick Feamster,et al. Augur: Internet-Wide Detection of Connectivity Disruptions , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[2] Tadayoshi Kohno,et al. Satellite: Joint Analysis of CDNs and Network-Level Interference , 2016, USENIX Annual Technical Conference.
[3] Ram Sundara Raman,et al. Measuring the Deployment of Network Censorship Filters at Global Scale , 2020, NDSS.
[4] Marco Chiesa,et al. Analysis of country-wide internet outages caused by censorship , 2011, IMC '11.
[5] J. Alex Halderman,et al. Quack: Scalable Remote Measurement of Application-Layer Censorship , 2018, USENIX Security Symposium.
[6] Narseo Vallina-Rodriguez,et al. Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services , 2020, Internet Measurement Conference.
[7] J. Alex Halderman,et al. A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.
[8] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[9] R. Sarpong,et al. Bio-inspired synthesis of xishacorenes A, B, and C, and a new congener from fuscol† †Electronic supplementary information (ESI) available. See DOI: 10.1039/c9sc02572c , 2019, Chemical science.
[10] Towards a Comprehensive Picture of the Great Firewall's DNS Censorship , 2014, FOCI.
[11] Emily K. Vraga,et al. A first look at COVID-19 information and misinformation sharing on Twitter , 2020, ArXiv.
[12] Cindy Cheng,et al. COVID-19 Government Response Event Dataset (CoronaNet v.1.0) , 2020, Nature Human Behaviour.
[13] Zhuoqing Morley Mao,et al. Internet Censorship in China: Where Does the Filtering Occur? , 2011, PAM.
[14] Philipp Winter,et al. Analyzing the Great Firewall of China Over Space and Time , 2015, Proc. Priv. Enhancing Technol..
[15] A. L. Schmidt,et al. The COVID-19 social media infodemic , 2020, Scientific Reports.
[16] Kelly M. McMann,et al. V-Dem Codebook V10 , 2020 .
[17] Emilio Ferrara,et al. What types of COVID-19 conspiracies are populated by Twitter bots? , 2020, First Monday.
[18] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[19] Roxana Radu. Fighting the ‘Infodemic’: Legal Responses to COVID-19 Disinformation , 2020, Social media + society.
[20] Chuan Yu,et al. Trends in the diffusion of misinformation on social media , 2018, Research & Politics.
[21] Roya Ensafi,et al. Decentralized Control: A Case Study of Russia , 2020, NDSS.
[22] Eric Wustrow,et al. ZMap: Fast Internet-wide Scanning and Its Security Applications , 2013, USENIX Security Symposium.
[23] Jacob Appelbaum,et al. OONI: Open Observatory of Network Interference , 2012, FOCI.
[24] J. Alex Halderman,et al. Internet Censorship in Iran: A First Look , 2013, FOCI.
[25] Rebecca MacKinnon,et al. China's Censorship 2.0: How Companies Censor Bloggers , 2009, First Monday.
[26] Nick Feamster,et al. Global Measurement of DNS Manipulation , 2017, USENIX Security Symposium.
[27] Katharina Kohls,et al. Censored Planet: An Internet-wide, Longitudinal Censorship Observatory , 2020, CCS.
[28] W. Marsden. I and J , 2012 .
[29] Benjamin Edelman,et al. Internet Filtering in China , 2003, IEEE Internet Comput..
[30] Linhai Song,et al. Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines , 2019, Internet Measurement Conference.