Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








170 Hits in 5.2 sec

Filtering in Oz: Australia's Foray into Internet Censorship

Derek E. Bambauer
2008 Social Science Research Network  
, effectiveness at blocking non-Web content, and scalability. 126 Interestingly, the trial's framework contemplates using a user complaint system not only to determine sites to block (which the ACMA  ...  the set of targeted sites comports with the underlying rationales for censorship.  ... 
doi:10.2139/ssrn.1319466 fatcat:wpkgyspcqbdibbe7gjkostq3ka

Access controlled: the shaping of power, rights, and rule in cyberspace

2010 ChoiceReviews  
For Web servers, the protocol data may include cookies, which are often used to assign a pseudonymous identity that persists between separate requests.  ...  While some Web sites are still vertically integrated and managed, the vast majority of Web site developers rent server space from Web hosting companies or use free Web hosting services like Tripod.com  ... 
doi:10.5860/choice.48-2125 fatcat:pnspoirndfenlhq3urwsqomh2m

Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat

Robert Brumnik, Sergii Kavun
2015 Computer Technology and Application  
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information.  ...  On the Web you can find a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service-NSA (National Security Agency).  ...  SATAN features an easy-to-use interface, an extensible framework, and a scalable approach to checking systems.  ... 
doi:10.17265/1934-7332/2015.01.007 fatcat:xsp7e5wr7vakjplwboy5tcdc64

Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research [article]

Saad Saleh, Junaid Qadir, Muhammad U. Ilyas
2018 arXiv   pre-print
No consistent parameters have been used for Tor performance analysis. The majority of authors performed throughput and latency analysis.  ...  Webfetch was used to download the target file (87KB) from author's web server. Connecting circuits and load was varied to verify the proposed path selection strategy. Alsabah et al.  ...  . • UltraSurf [33] : Uses HTTP proxy to bypass censorship and uses encryption protocols for privacy. • CyberGhost VPN [34] : OpenVPN based proprietary client, Centralized server with VPN using 1024-SSL  ... 
arXiv:1803.02816v1 fatcat:kl5fkcq5tnbczblpgdesatocji

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
We conclude the survey with lessons learned and scope for future work.  ...  Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with  ...  The approaches are similar in spirit to the popular Tor (The onion routing protocol-the popular anti-censorship tool for IP networks).  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

Please, do not decentralize the Internet with (permissionless) blockchains! [article]

Pedro Garcia Lopez, Alberto Montresor, Anwitaman Datta
2019 arXiv   pre-print
The ability of establish trust through permissioned blockchains enables to move the control from the datacenters to the edge, truly realizing the promises of edge-centric computing.  ...  This is derived from the recent surge in interest in byzantine fault tolerance and permissioned blockchains, which opens the door to a world where use of trusted third parties is not the only way to arbitrate  ...  frameworks hinder their adoption.  ... 
arXiv:1904.13093v1 fatcat:d6imefokw5cydpjdh2wfdpqvve

India, The Fourth Industrial Revolution and Government Policy

S. Patanjali, D. Subramaniam
2019 Arthshastra Indian Journal of Economics & Research  
We focus instead on what sorts of attacks we are likely to see soon if adequate defenses are not developed.  ...  Less attention has historically been paid to the ways in which artificial intelligence can be used maliciously.  ...  References References p.68 The Malicious Use of Artificial Intelligence  ... 
doi:10.17010/aijer/2019/v8i2/145224 fatcat:srchlppo6za4hd4klygunfpwuq

Human Trafficking and Online Networks: Policy, Analysis, and Ignorance

Jonathan Mendel, Kiril Sharapov
2016 Antipode  
Ignorance also works in powerful ways in US attempts to target human trafficking by regulating and policing the Internet.  ...  , user collaboration, and extension of current search capabilities to the deep web, the dark web, and nontraditional content' (DARPA 2015a).  ... 
doi:10.1111/anti.12213 fatcat:3xuq6c6jwfbk7fbcfech2o5dlm

Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime [article]

Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini
2022 arXiv   pre-print
In this paper, we argue that it would be beneficial for the information security community to look at the theories and systematic frameworks developed in environmental criminology to develop better mitigations  ...  Finally, we discuss the concept of cyberplaces and propose a framework in order to define them.  ...  Ife is supported by the Dawes Centre for Future Crimes, and EPSRC under grant EP/M507970/1. Steven J. Murdoch is supported by The Royal Society under grant UF160505.  ... 
arXiv:1910.06380v2 fatcat:2jklb4lzmfd6bo7bdftef2v6am

A Survey on Future Internet Security Architectures

Wenxiu Ding, Zheng Yan, Robert H. Deng
2016 IEEE Access  
Open security issues are pointed out for directing future research.  ...  These projects aim to move away from the traditional host-centric networks and replace them with content-centric, mobilitycentric, or service-centric networks.  ...  As the XIA supports multiple types of identifiers, a device can optionally choose XIDs according to their own use. For example, the device can use one XID for email and another for web search.  ... 
doi:10.1109/access.2016.2596705 fatcat:ny3dd4naaref7ktsmu32xzosbe

Digital media and misinformation: An outlook on multidisciplinary strategies against manipulation

Danielle Caled, Mário J. Silva
2021 Journal of Computational Social Science  
AbstractThis review discusses the dynamic mechanisms of misinformation creation and spreading used in social networks.  ...  an analysis of the cognitive vulnerabilities that hinder the correction of the effects of an inaccurate narrative already assimilated; and (3) an interdisciplinary discussion on different strategies for  ...  Little information about their use or scalability is available either in scientific literature, web application stores, or even in communities/profiles on social networks.  ... 
doi:10.1007/s42001-021-00118-8 pmid:34075349 pmcid:PMC8156576 fatcat:3uagqf2i2ndpdcxei7wceynxzy

Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions [article]

Mansoor Ali, Faisal Naeem, Georges Kaddoum, Ekram Hossain
2023 arXiv   pre-print
Finally, the application of distributed Metaverse for social good is highlighted.  ...  Moreover, it requires the convergence of several media types with the capability to quickly process massive amounts of data to keep the residents safe and well-informed, which can raise issues related to scalability  ...  for facilitating targeted advertising activities and user profiling.  ... 
arXiv:2212.13993v2 fatcat:ttj56oxho5e57h33uwgk4qnhz4

The Layers Principle: Internet Architecture and the Law

Lawrence B. Solum, Minn Chung
2003 Social Science Research Network  
client (the browser) communicates with the web server using HTTP (the protocol of the World Wide Web) to exchange data.  ...  ETHERNET WEB COMMUNICATIONS (User on a PC (Web server running Windows) running on a Sun Workstation) Application Layer Web Browser Web Server HTTP protocol Transport Layer TCP TCP -d TCP  ...  Layer-Crossing Regulations in the Communication System Layers A layer-crossing regulation may target, for example, a code layer in order to counter the problems that arose at the content layer.  ... 
doi:10.2139/ssrn.416263 fatcat:pskwxoakgjhpndmchtfyhqvlxm

China's Conception of Cyber Sovereignty: Rhetoric and Realization

Rogier Creemers
2020 Social Science Research Network  
also be repurposed for oppression-and authoritarian regimes were using it this way through censorship.  ...  While this system was operated relatively secretively at first, by 2006, the People's Daily proudly boasted that "[Chinese] Internet users don't have to surf the web via the servers under the management  ...  Index ambiguity, 210 anti-hegemonic grievances, 92 Apple, 128 Arab Convention, 216-17 artificial intelligence, 296 ASEAN Regional Forum (ASF), 10 ASF.  ... 
doi:10.2139/ssrn.3532421 fatcat:mauajbbhzrak5jruw4uz2ixgoa

Analysis of Reversible Network Covert Channels

Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione
2022 IEEE Access  
The results confirm that reversibility can be used in various network conditions and is not impaired by middleboxes.  ...  In this paper, we further investigate various methods for performing reversible data hiding for network covert channels.  ...  According to results, the proxy server accounts for an additional delay in the Page Loading Time of ∼8 ms, despite the used encoding scheme.  ... 
doi:10.1109/access.2022.3168018 fatcat:nlbvdyblkrgzpcyo6ujfg33oee
« Previous Showing results 1 — 15 out of 170 results