Back to Results
First PageMeta Content
System software / Proxy server / Internet censorship / SOCKS / Tor / Censorship / Content-control software / Internet censorship circumvention / Internet censorship in Thailand / Internet privacy / Computing / Internet


arXiv:1402.3401v5 [cs.CY] 5 Nov[removed]Censorship in the Wild: Analyzing Internet Filtering in Syria Abdelberi Chaabane Terence Chen
Add to Reading List

Document Date: 2014-11-05 22:13:23


Open Document

File Size: 967,52 KB

Share Result on Facebook

City

Keyword / Sydney / London / /

Company

BitTorrent / Skype / Twitter / Facebook / Instant Messaging Software / MySpace / CBS news / Linkedin / Wall Street Journal / Online Social Networks / Google / Bloomberg / /

Country

Yemen / Egypt / Pakistan / China / Israel / Saudi Arabia / Iran / United Arab Emirates / Libya / Qatar / Syria / /

Currency

USD / /

Event

M&A / /

Facility

France Emiliano De Cristofaro Arik Friedman Mohamed Ali Kaafar University College / Australia University of Lyon / /

IndustryTerm

censorship resistant systems / censorship infrastructure / so-called social plugins / Internet censorship / user-contributed streaming media sites / well-targeted social media pages / surveillance using well-known web/socks proxies / social media / Internet traffic / advertising components / surveillance equipment / censorship technologies / social networks / country-wide Internet outages / few social networks / Internet users / censorshipcircumvention technologies / anti-censorship technologies / provincial networks / few ads delivery networks / social media posts / Internet backbone / censorship circumvention tools / web/socks proxies / Internet connections / censorship-evading tools / file sharing software / backbone-level routers / proxy server / surveillance-evading software / Internet Filtering / proxy-based censorship-circumvention technologies / power law distribution / /

OperatingSystem

Microsoft Windows / /

Organization

Paper Organization / Institutional Review Board / Syrian.Revolution.Army / Electronic Frontier Foundation / Citizen Lab / Australia University of Lyon / NICTA’s Institutional Review Board / University College London / Syrian government / Reporters Without Borders / Syrian Telecom Ministry / Chinese government / /

Person

Denied Dataset / Sample Dataset (Dsample) / Ai / Tor bridges / Assad / /

Position

General / King / representative / hb / messenger / /

Product

Blue Coat / Maxmind GeoIP / McAfee / /

ProgrammingLanguage

php / HTML / /

ProvinceOrState

North Carolina / /

PublishedMedium

the Wall Street Journal / /

Region

Middle East / North Africa / East Africa / /

Technology

API / proxy-based censorship-circumvention technologies / underlying technologies / HTML / ajax / ISP / censorshipcircumvention technologies / filtering technologies / php / VPN / P2P / Streaming Media / UDP / SSL / anti-censorship technologies / backbone-level routers / DNS / proxy server / request Protocol / firewall / censorship technologies / file sharing / HTTP / caching / IPv4 / /

URL

wikimedia.org / www.facebook / skype.com / live.com / xvideos.com / amazon.com / upload.youtube.com / sharek.aljazeera.net / gstatic.com / doubleclick.net / ceipmsn.com / yahoo.com / zynga.com / www.facebook.com/Syrian / facebook.com / www.eff.org/deeplinks/2011/05/syrian-man-middleagainst-facebook / microsoft.com / www.trustedsource.org / http /

SocialTag