[1]
|
(2015) Tor Project: Anonymity Online. [Online]. https://www.torproject.org/
|
[2]
|
(2015) Ultrasurf—Free Proxy-Based Internet Privacy and Security Tools. [Online]. http://ultrasurf.us/index.html
|
[3]
|
(2015) GPass. Softonic. [Online]. http://gpass.en.softonic.com/
|
[4]
|
(2015) Garden Networks for Information Freedom. [Online]. http://gardennetworks.org/products
|
[5]
|
(2014) Fire Phoenix Secure Browser. Vionika.
|
[6]
|
(2007) Global Internet Freedom Consortium. Defeat Internet Censorship: Overview of Advanced Technologies and Products.
|
[7]
|
Leberknight, C.S., Chiang, M. and Wong, F.M.F. (2012) A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies. International Journal of E-Politics, 3, 20-35. http://dx.doi.org/10.4018/jep.2012100102
|
[8]
|
Appelbaum, J. (2012) Technical Analysis of the Ultrasurf Proxying Software. The Tor Project, Technical Report.
|
[9]
|
(2015) The netfilter.org “iptables” Project. [Online]. http://www.netfilter.org/projects/iptables/
|
[10]
|
Rovniagin, D. and Wool, A. (2011) The Geometric Efficient Matching Algorithm for Firewalls. IEEE Transactions on Dependable and Secure Computing, 8, 147-159. http://dx.doi.org/10.1109/TDSC.2009.28
|
[11]
|
Houmansadr, A., Nguyen, G.T., Caesar, M. and Borisov, N. (2011) Cirripede: Circumvention Infrastructure Using Router Redirection with Plausible Deniability. Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, 17-21 October 2011, 187-200. http://dx.doi.org/10.1145/2046707.2046730
|
[12]
|
Wang, Q., Gong, X., Nguyen, G.T., Houmansadr, A. and Borisov, N. (2012) Censorspoofer: Asymmetric Communication Using Ip Spoofing for Censorship-Resistant Web Browsing. Proceedings of the 2012 ACM Conference on Computer and Communications Security, New York, 16-18 October 2012, 121-132.http://dx.doi.org/10.1145/2382196.2382212
|
[13]
|
Houmansadr, A., Brubaker, C. and Shmatikov, V. (2013) The Parrot Is Dead: Observing Unobservable Network Communications. Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, 19-22 May 2013, 65-79. http://dx.doi.org/10.1109/sp.2013.14
|
[14]
|
Geddes, J., Schuchard, M. and Hopper, N. (2013) Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 4-8 November 2013, 361-372.
|
[15]
|
Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F. and Boneh, D. (2012) StegoTorus: A Camouflage Proxy for the Tor Anonymity System. Proceedings of the 2012 ACM Conference on Computer and Communications Security, New York, 16-18 October 2012, 109-120. http://dx.doi.org/10.1145/2382196.2382211
|
[16]
|
Burnett, S. and Feamster, N. (2013) Making Sense of Internet Censorship: A New Frontier for Internet Measurement. ACM SIGCOMM Computer Communication Review, 43, 84-89. http://dx.doi.org/10.1145/2500098.2500111
|
[17]
|
Jones, B., Lee, T.-W., Feamster, N. and Gill, P. (2014) Automated Detection and Fingerprinting of Censorship Block Pages. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 3-7 November 2014, 299-304.
|
[18]
|
Anderson, D. (2012) Splinternet behind the Great Firewall of China. Queue, 10, 40.
|
[19]
|
Khattak, S., Javed, M., Khayam, S.A., Uzmi, Z.A. and Paxson, V. (2014) A Look at the Consequences of Internet Censorship Through an ISP Lens. Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, 5-7 November 2014, 271-284.
|
[20]
|
(2015) OpSyria: When the Internet Does Not Let Citizens down. Reflets. http://reflets.info/opsyria-when-the-internet-does-not-let-citizens-down/
|
[21]
|
Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A. and Kaafar, M.A. (2014) Censorship in the Wild: Analyzing Internet Filtering in Syria. Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, 5-7 November 2014, 285-298.
|
[22]
|
(2010) Brita, Digital Weapons Help Dissidents Punch Holes in China’s Great Firewall, WIRED. http://www.wired.com/2010/11/ff_firewallfighters/
|
[23]
|
Callanan, C., Dries-Ziekenheiner, H., Escudero-Pascual, A., and Guerra, R. (2014) Leaping over the Firewall: A Review of Censorship Circumvention Tools.
|
[24]
|
(2012) Tor’s Critique of Ultrasurf: A Reply from the Ultrasurf Developers. Ultrareach Internet Corp.
|
[25]
|
Osman, B., Abas, A. and Harmoni, K. (2011) Strategy to Block Traffic Create By Anti-Censorship Software in LAN for Small and Medium Organisation. Proceedings of the 3rd International Conference on Computing and Informatics (ICOCI), Bandung, 8-9 June 2011, 358-365.
|
[26]
|
(2015) Squid: Optimising Web Delivery. http://www.squid-cache.org/
|
[27]
|
(2015) The Netfilter.org “Libnetfilter_Queue” Project. http://www.netfilter.org/projects/libnetfilter_queue/
|