Главная
Study mode:
on
1
Introduction
2
Censorship Scenario
3
Sensors
4
Attack Types
5
Research
6
Evaluation
7
Analysis
8
Activeness
9
Robustness
10
Summary
Description:
Explore a comprehensive analysis of Internet censorship circumvention techniques in this 17-minute IEEE conference talk. Delve into the empirical study of real-world censorship practices, examining measurement studies, field reports, and practitioner bug tickets. Evaluate both deployed and proposed circumvention methods against observed censor behaviors, identifying gaps in current research approaches. Gain insights into realigning censorship circumvention research with contemporary challenges, covering topics such as censorship scenarios, sensors, attack types, and evaluation criteria including activeness and robustness.

Towards Grounding Censorship Circumvention in Empiricism

IEEE
Add to list