<--- Back to Details
First PageDocument Content
Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite
Date: 2017-04-03 15:56:26
Computer network security
Cyberwarfare
Computer security
Computing
Computer security software
Idle scan
Denial-of-service attack
Transmission Control Protocol
Stateful firewall
Internet censorship
Great Firewall
Internet protocol suite

Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 1,74 MB

Share Document on Facebook

Similar Documents

Characterization of Internet Censorship from Multiple Perspectives ! Shehar Bano ! University College London!

Characterization of Internet Censorship from Multiple Perspectives ! Shehar Bano ! University College London!

DocID: 1xVoY - View Document

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

DocID: 1xV2b - View Document

The State of Internet Censorship in Egypt A research study by: Open Observatory of Network Interference (OONI) Association for Freedom of Thought and Expression (AFTE)

The State of Internet Censorship in Egypt A research study by: Open Observatory of Network Interference (OONI) Association for Freedom of Thought and Expression (AFTE)

DocID: 1xUEU - View Document

A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1  University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

DocID: 1xUgR - View Document

1  SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

1 SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

DocID: 1xTrK - View Document