ConceptDoppler: a weather tracker for internet censorship
暂无分享,去创建一个
Jedidiah R. Crandall | Earl T. Barr | Daniel Zinn | Michael Byrd | Rich East | J. Crandall | D. Zinn | M. Byrd | Rich East | Daniel Zinn
[1] V. Paxson. End-to-end routing behavior in the internet , 2006, CCRV.
[2] Peter W. Foltz,et al. An introduction to latent semantic analysis , 1998 .
[3] Thomas Hofmann,et al. Probabilistic Latent Semantic Analysis , 1999, UAI.
[4] Wael Hassan. Simplified Wrapper and Interface Generator , 2000 .
[5] C. Liang. Red Light, Green Light: Has China Achieved Its Goals through the 2000 Internet Regulations? , 2001 .
[6] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[7] Michael S. Chase,et al. You've Got Dissent!: Chinese Dissident Use of the Internet and Beijing's Counter-Strategies , 2002 .
[8] Andreas Zeller,et al. Simplifying and Isolating Failure-Inducing Input , 2002, IEEE Trans. Software Eng..
[9] Jia Wang,et al. Towards an accurate AS-level traceroute tool , 2003, SIGCOMM '03.
[10] Maximillian Dornseif,et al. Government mandated blocking of foreign Web content , 2004, DFN-Arbeitstagung über Kommunikationsnetze.
[11] Benjamin Edelman,et al. Internet Filtering in China , 2003, IEEE Internet Comput..
[12] Andi Wu,et al. Customizable Segmentation of Morphologically Derived Words in Chinese , 2003, Int. J. Comput. Linguistics Chin. Lang. Process..
[13] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.
[14] Westone,et al. Home Page , 2004, 2022 2nd International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA).
[15] Jaideep Chandrashekar,et al. On Properties of Internet Exchange Points and Their Impact on AS Topology and Relationship , 2004, NETWORKING.
[16] Ronald J. Deibert,et al. Internet Filtering in China in 2004-2005: A Country Study , 2005 .
[17] Richard Clayton,et al. Failures in a Hybrid Content Blocking System , 2005, Privacy Enhancing Technologies.
[18] Weblog Wikipedia,et al. In Wikipedia the Free Encyclopedia , 2005 .
[19] Francesco Romani,et al. Ranking a stream of news , 2005, WWW '05.
[20] George Danezis,et al. Economics of Information Security , 2005 .
[21] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[22] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[23] Patrick F. Reidy. An Introduction to Latent Semantic Analysis , 2009 .