A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Filtering in Oz: Australia's Foray into Internet Censorship
2008
Social Science Research Network
, effectiveness at blocking non-Web content, and scalability. 126 Interestingly, the trial's framework contemplates using a user complaint system not only to determine sites to block (which the ACMA ...
the set of targeted sites comports with the underlying rationales for censorship. ...
doi:10.2139/ssrn.1319466
fatcat:wpkgyspcqbdibbe7gjkostq3ka
Access controlled: the shaping of power, rights, and rule in cyberspace
2010
ChoiceReviews
For Web servers, the protocol data may include cookies, which are often used to assign a pseudonymous identity that persists between separate requests. ...
While some Web sites are still vertically integrated and managed, the vast majority of Web site developers rent server space from Web hosting companies or use free Web hosting services like Tripod.com ...
doi:10.5860/choice.48-2125
fatcat:pnspoirndfenlhq3urwsqomh2m
Information Technology in Domain of Electronic Intelligence and Cyberterrorism Combat
2015
Computer Technology and Application
Terms of intelligence in 20th and 21th century mean the methods of automatic extraction, analysis, interpretation and use of information. ...
On the Web you can find a list of networks (Cryptome, 2011), which could be connected, or are under the control of the security service-NSA (National Security Agency). ...
SATAN features an easy-to-use interface, an extensible framework, and a scalable approach to checking systems. ...
doi:10.17265/1934-7332/2015.01.007
fatcat:xsp7e5wr7vakjplwboy5tcdc64
Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research
[article]
2018
arXiv
pre-print
No consistent parameters have been used for Tor performance analysis. The majority of authors performed throughput and latency analysis. ...
Webfetch was used to download the target file (87KB) from author's web server. Connecting circuits and load was varied to verify the proposed path selection strategy. Alsabah et al. ...
. • UltraSurf [33] : Uses HTTP proxy to bypass censorship and uses encryption protocols for privacy. • CyberGhost VPN [34] : OpenVPN based proprietary client, Centralized server with VPN using 1024-SSL ...
arXiv:1803.02816v1
fatcat:kl5fkcq5tnbczblpgdesatocji
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
[article]
2017
arXiv
pre-print
We conclude the survey with lessons learned and scope for future work. ...
Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with ...
The approaches are similar in spirit to the popular Tor (The onion routing protocol-the popular anti-censorship tool for IP networks). ...
arXiv:1603.03409v3
fatcat:ynhnoqve3nbzrdvlxy4jigzlkq
Please, do not decentralize the Internet with (permissionless) blockchains!
[article]
2019
arXiv
pre-print
The ability of establish trust through permissioned blockchains enables to move the control from the datacenters to the edge, truly realizing the promises of edge-centric computing. ...
This is derived from the recent surge in interest in byzantine fault tolerance and permissioned blockchains, which opens the door to a world where use of trusted third parties is not the only way to arbitrate ...
frameworks hinder their adoption. ...
arXiv:1904.13093v1
fatcat:d6imefokw5cydpjdh2wfdpqvve
India, The Fourth Industrial Revolution and Government Policy
2019
Arthshastra Indian Journal of Economics & Research
We focus instead on what sorts of attacks we are likely to see soon if adequate defenses are not developed. ...
Less attention has historically been paid to the ways in which artificial intelligence can be used maliciously. ...
References
References p.68 The Malicious Use of Artificial Intelligence ...
doi:10.17010/aijer/2019/v8i2/145224
fatcat:srchlppo6za4hd4klygunfpwuq
Human Trafficking and Online Networks: Policy, Analysis, and Ignorance
2016
Antipode
Ignorance also works in powerful ways in US attempts to target human trafficking by regulating and policing the Internet. ...
, user collaboration, and extension of current search capabilities to the deep web, the dark web, and nontraditional content' (DARPA 2015a). ...
doi:10.1111/anti.12213
fatcat:3xuq6c6jwfbk7fbcfech2o5dlm
Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime
[article]
2022
arXiv
pre-print
In this paper, we argue that it would be beneficial for the information security community to look at the theories and systematic frameworks developed in environmental criminology to develop better mitigations ...
Finally, we discuss the concept of cyberplaces and propose a framework in order to define them. ...
Ife is supported by the Dawes Centre for Future Crimes, and EPSRC under grant EP/M507970/1. Steven J. Murdoch is supported by The Royal Society under grant UF160505. ...
arXiv:1910.06380v2
fatcat:2jklb4lzmfd6bo7bdftef2v6am
A Survey on Future Internet Security Architectures
2016
IEEE Access
Open security issues are pointed out for directing future research. ...
These projects aim to move away from the traditional host-centric networks and replace them with content-centric, mobilitycentric, or service-centric networks. ...
As the XIA supports multiple types of identifiers, a device can optionally choose XIDs according to their own use. For example, the device can use one XID for email and another for web search. ...
doi:10.1109/access.2016.2596705
fatcat:ny3dd4naaref7ktsmu32xzosbe
Digital media and misinformation: An outlook on multidisciplinary strategies against manipulation
2021
Journal of Computational Social Science
AbstractThis review discusses the dynamic mechanisms of misinformation creation and spreading used in social networks. ...
an analysis of the cognitive vulnerabilities that hinder the correction of the effects of an inaccurate narrative already assimilated; and (3) an interdisciplinary discussion on different strategies for ...
Little information about their use or scalability is available either in scientific literature, web application stores, or even in communities/profiles on social networks. ...
doi:10.1007/s42001-021-00118-8
pmid:34075349
pmcid:PMC8156576
fatcat:3uagqf2i2ndpdcxei7wceynxzy
Metaverse Communications, Networking, Security, and Applications: Research Issues, State-of-the-Art, and Future Directions
[article]
2023
arXiv
pre-print
Finally, the application of distributed Metaverse for social good is highlighted. ...
Moreover, it requires the convergence of several media types with the capability to quickly process massive amounts of data to keep the residents safe and well-informed, which can raise issues related to scalability ...
for facilitating targeted advertising activities and user profiling. ...
arXiv:2212.13993v2
fatcat:ttj56oxho5e57h33uwgk4qnhz4
The Layers Principle: Internet Architecture and the Law
2003
Social Science Research Network
client (the browser) communicates with the web server using HTTP (the protocol of the World Wide Web) to exchange data. ...
ETHERNET WEB COMMUNICATIONS
(User on a PC
(Web server
running Windows)
running on a Sun
Workstation)
Application Layer
Web Browser
Web Server
HTTP protocol
Transport Layer
TCP
TCP
-d TCP ...
Layer-Crossing Regulations in the Communication System Layers A layer-crossing regulation may target, for example, a code layer in order to counter the problems that arose at the content layer. ...
doi:10.2139/ssrn.416263
fatcat:pskwxoakgjhpndmchtfyhqvlxm
China's Conception of Cyber Sovereignty: Rhetoric and Realization
2020
Social Science Research Network
also be repurposed for oppression-and authoritarian regimes were using it this way through censorship. ...
While this system was operated relatively secretively at first, by 2006, the People's Daily proudly boasted that "[Chinese] Internet users don't have to surf the web via the servers under the management ...
Index ambiguity, 210 anti-hegemonic grievances, 92 Apple, 128 Arab Convention, 216-17 artificial intelligence, 296 ASEAN Regional Forum (ASF), 10 ASF. ...
doi:10.2139/ssrn.3532421
fatcat:mauajbbhzrak5jruw4uz2ixgoa
Analysis of Reversible Network Covert Channels
2022
IEEE Access
The results confirm that reversibility can be used in various network conditions and is not impaired by middleboxes. ...
In this paper, we further investigate various methods for performing reversible data hiding for network covert channels. ...
According to results, the proxy server accounts for an additional delay in the Page Loading Time of ∼8 ms, despite the used encoding scheme. ...
doi:10.1109/access.2022.3168018
fatcat:nlbvdyblkrgzpcyo6ujfg33oee
« Previous
Showing results 1 — 15 out of 170 results