Adam Senft
Titel
Citeras av
Citeras av
År
Targeted threat index: Characterizing and quantifying politically-motivated targeted malware
S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 527-541, 2014
492014
A method for identifying and confirming the use of URL filtering products for censorship
J Dalek, B Haselton, H Noman, A Senft, M Crete-Nishihata, P Gill, ...
Proceedings of the 2013 conference on Internet measurement conference, 23-30, 2013
412013
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
352013
Characterizing web censorship worldwide: Another look at the opennet initiative data
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015
342015
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015
242015
Not By Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls
M Crete-Nishihata, R Deibert, A Senft
IEEE, 2013
162013
Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation
B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune
The Citizen Lab, 2015
72015
The Kingdom Came to Canada
B Marczak, J Scott-Railton, A Sen, BA Razzak, R Deibert
Citizen Lab, October 2, 2018
52018
Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
B Marczak, J Dalek, S McKune, A Senft, J Scott-Railton, R Deibert
52018
Baidu’s and don’ts: Privacy and security issues in baidu browser
J Knockel, S McKune, A Senft
52016
A tough nut to crack: A further look at privacy and security issues in UC browser
J Knockel, A Senft, R Deibert
52016
Information controls during military operations: The case of Yemen during the 2015 political and armed conflict
J Dalek, R Deibert, S McKune, P Gill, N Noor, A Senft
52015
Privacy and Security Issues in BAT Web Browsers
J Knockel, A Senft, R Deibert
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)}, 2016
42016
Planet Netsweeper
J Dalek, L Gill, B Marczak, S McKune, N Noor, J Oliver, J Penney, A Senft, ...
32018
Tender Confirmed, Rights at Risk: Verifying Netsweeper in Bahrain
J Dalek, R Deibert, B Marczak, S McKune, H Noman, I Poetranto, A Senft
32016
Characterizing censorship of web content worldwide
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
22008
Censors Get Smart: Evidence from Psiphon in Iran
R Deibert, J Oliver, A Senft
Review of Policy Research 36 (3), 341-356, 2019
2019
Dual-Use Technologies: Network Traffic Management and Device Intrusion for Targeted Monitoring
S Anstis, S Chan, A Senft, RJ Deibert
2019
Internet Governance During Crisis: The Changing Landscape of Thailand
I Poetranto, A Senft
GigaNet: Global Internet Governance Academic Network, Annual Symposium, 2016
2016
Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites
K Kleemola, M Crete-Nishihata, A Senft, I Poetranto
2015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20