Filters








9 Hits in 6.1 sec

Analyzing the Great Firewall of China Over Space and Time

Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
<span title="2015-04-01">2015</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/feed3pdnijhbnm6huwkkxavghy" style="color: black;">Proceedings on Privacy Enhancing Technologies</a> </i> &nbsp;
A nation-scale firewall, colloquially referred to as the "Great Firewall of China," implements many different types of censorship and content filtering to control China's Internet traffic.  ...  of the researcher performing measurements.  ...  Acknowledgments We would like to thank our shepherd, Dali Kaafar, as well as the anonymous reviewers. We would also like to thank Kasra Manavi.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/popets-2015-0005">doi:10.1515/popets-2015-0005</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/popets/EnsafiWMC15.html">dblp:journals/popets/EnsafiWMC15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/el43wzsw4vbepkw4eq3znnkjxy">fatcat:el43wzsw4vbepkw4eq3znnkjxy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504141352/https://content.sciendo.com/downloadpdf/journals/popets/2015/1/article-p61.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/c7/f1c7b9ce2e8daa2ee834d5daea1727c486ba390d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/popets-2015-0005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> degruyter.com </button> </a>

Large-scale Spatiotemporal Characterization of Inconsistencies in the World's Largest Firewall [article]

Roya Ensafi, Philipp Winter, Abdullah Mueen, Jedidiah R. Crandall
<span title="2014-10-03">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our work also answers many other open questions about the Great Firewall's architecture and implementation.  ...  A nation-scale firewall, colloquially referred to as the "Great Firewall of China," implements many different types of censorship and content filtering to control China's Internet traffic.  ...  The author from Karlstad University was supported by a research grant from Internetfonden.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1410.0735v1">arXiv:1410.0735v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dmcpksj7bjbgbh4yqoxmvvpqli">fatcat:dmcpksj7bjbgbh4yqoxmvvpqli</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200907131741/https://arxiv.org/pdf/1410.0735v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cf/54/cf54be13277564ad281918f25e6a0d3c257310e4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1410.0735v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Title Threat modeling and circumvention of Internet censorship Publication Date

Author Fifield, David, David Fifield, David Fifield, J Tygar
<span title="">2017</span> <span class="release-stage">unpublished</span>
I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.  ...  My research addresses the twin themes of modeling and circumvention.  ...  There were multiple methods of censorship: web server IP address blocking, DNS server IP address blocking, DNS poisoning, and keyword filtering.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5mwzajvkr5d7fo6a3nsazf4e4i">fatcat:5mwzajvkr5d7fo6a3nsazf4e4i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180411011016/https://cloudfront.escholarship.org/dist/prd/content/qt0bh5c50p/qt0bh5c50p.pdf?t=p6q1zk" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/51/d95185e1070f15b978cfa68a69f580ef75c29c64.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Threat modeling and circumvention of Internet censorship

David Fifield, David Fifield, J Tygar
<span title="">2017</span> <span class="release-stage">unpublished</span>
I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.  ...  My research addresses the twin themes of modeling and circumvention.  ...  There were multiple methods of censorship: web server IP address blocking, DNS server IP address blocking, DNS poisoning, and keyword filtering.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbnnx5f34vhldmke4zkjg5jblq">fatcat:kbnnx5f34vhldmke4zkjg5jblq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180411011026/https://cloudfront.escholarship.org/dist/prd/content/qt0bh5c50p/qt0bh5c50p.pdf?t=p6q1zk&amp;nosplash=2c96f988bf0eaff388c4fdc579b1a88b" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/07/5807ca34f07ca012c99038b564ae9bd319594d63.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

A Deception Based Intelligent Intrusion Detection System for Detecting Threats of Exploits in Cloud Based Environments

U.O Oluoha, Dept of Computer Science University of Nigeria, Nsukka, Nigeria., G.E. Okereke, N.C. Udanor, F.S. Bakpo
<span title="2021-10-31">2021</span> <i title="Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers"> Proceedings of the 28th iSTEAMS Multidisciplinary &amp; Inter-tertiary Research Conference </i> &nbsp; <span class="release-stage">unpublished</span>
Proceedings of the 28th iSTEAMS Intertertiary Multidisciplinary Conference. American International University West Africa, The Gambia. October, 2021. Pp 7-36 www.isteams.net/gambia2021.  ...  The idea was to build a valid attack sequence and not exploring all the ways to run the particular stage of an exploit.  ...  The average PRT of "ARP Cache Poisoning using Python Scapy" showed that the response times of all the phases except one are similar: varying between 0 to 40 seconds. However, one phase stands out.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22624/aims/isteams-2021/v28p2x">doi:10.22624/aims/isteams-2021/v28p2x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cl7xv7rjajc7banfq4omg6ahy4">fatcat:cl7xv7rjajc7banfq4omg6ahy4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220204124155/https://www.isteams.net/_files/ugd/185b0a_63dcb4f8ce4b421fa2bf79961e1a55f3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/47/7e/477eb928f9386b62f4a5e3a43551c7f99de1d286.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22624/aims/isteams-2021/v28p2x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Deception Based Intelligent Intrusion Detection System for Detecting Threats of Exploits in Cloud Based Environments

U.O Oluoha, Dept of Computer Science University of Nigeria, Nsukka, Nigeria., G.E kereke, N.C. Udanor, F.S. Bakpo
<span title="2021-10-31">2021</span> <i title="Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers"> Proceedings of the 28th iSTEAMS Multidisciplinary &amp; Inter-tertiary Research Conference </i> &nbsp; <span class="release-stage">unpublished</span>
The machine learning scripts, attack codes and embedded socket and API integration scripts are presented in Python.  ...  The security framework was modelled with machine learning to further enhance its adaptability and predictive capabilities.  ...  The idea was to build a valid attack sequence and not exploring all the ways to run the particular stage of an exploit.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22624/aims/isteams-2021/v28p2">doi:10.22624/aims/isteams-2021/v28p2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2d26wuy24revdd32jysr2h3x44">fatcat:2d26wuy24revdd32jysr2h3x44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220130194543/https://www.isteams.net/_files/ugd/185b0a_969b116658d04749874ef5e230ac0550.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7a/e7/7ae74f449749ebcf7a21d5ef78c64b0a06bd740b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22624/aims/isteams-2021/v28p2"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2014 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair For Network Architectures
<span title="">2014</span>
The firewall's filter rules are usually designed to block incoming connections that are not a response to a previous outgoing request.  ...  If no cached DNS response is found there, the resolver asks its pre-defined DNS server for the IP.  ...  The result of the self-healing process will be monitored by the Self-healing and Monitoring function that has access to data of all of the above mentioned process and allows the operator to control the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2313/net-2014-08-1">doi:10.2313/net-2014-08-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xbhymyqonrdkjnmfqybdkych6a">fatcat:xbhymyqonrdkjnmfqybdkych6a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200219234114/https://www.net.in.tum.de/fileadmin/TUM/NET/NET-2014-08-1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2313/net-2014-08-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

The Ethics of Cybersecurity

S.N.
<span title="2020-01-01">2020</span>
In attempting to navigate utopian and dystopian visions of the future, it becomes clear that technological progress and its moral quandaries call for new policies and legislative responses.  ...  Alongside these technological advances new ethical ideas and powerful moral ideologies have appeared which force us to consider the application of these emerging technologies.  ...  Part of the research for this chapter was also done for the project ValueChange, which has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5167/uzh-194182">doi:10.5167/uzh-194182</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g6nlulogfng75d4fl6yw7xqbse">fatcat:g6nlulogfng75d4fl6yw7xqbse</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210226202700/https://www.zora.uzh.ch/id/eprint/194182/1/ChristenEtAl_EthicsCybersecurity_2020.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5167/uzh-194182"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+103 others)
<span title="">2016</span> <i > International Journal of Network Security </i> &nbsp; <span class="release-stage">unpublished</span>
Security of the protocol is based on the bio-metric authentication and a secure one way hash function with the hash chain.  ...  Finally, we provide the secure proof and the efficiency analysis about our proposed scheme.  ...  The authors gratefully acknowledge the reviewers for their valuable suggestions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/opax2a4dc5eutoy4mmoka5hgs4">fatcat:opax2a4dc5eutoy4mmoka5hgs4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180410004520/http://ijns.jalaxy.com.tw/contents/ijns-v18-n3/ijns-v18-n3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a>