books search
books
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Personal
Book Requests
Explore
Z-Recommend
Booklists
Most Popular
Categories
Contribution
Donate
Uploads
Litera Library
Donate paper books
Add paper books
Search paper books
My LITERA Point
Terms search
Main
Terms search
search
1
How Great is the Great Firewall Measuring China’s DNS Censorship
Nguyen Phong Hoang
,
Arian Akhavan Niaki
,
Jakub Dalek
,
Jeffrey Knockel
,
Pellaeon Lin
,
Bill Marczak
,
Masashi Crete-Nishihata
,
Phillipa Gill
,
Michalis Polychronakis
domains
censored
dns
ips
forged
gfw
censorship
responses
gfwatch
usenix
gfw’s
poisoned
blocked
discovered
measurement
network
blocking
figure
filtering
addresses
observed
security
legitimate
resolvers
injection
records
resource
ipv4
users
authoritative
queries
studies
probing
symposium
30th
detected
behavior
client
daily
groups
policy
shown
association
injected
total
detection
servers
circumvention
cumulative
popular
Year:
2021
Language:
english
File:
PDF, 711 KB
Your tags:
0
/
5.0
english, 2021
2
Community-based Traditional Music in Scotland: A Pedagogy of Participation
Routledge
Josephine L. Miller
gfw
tutors
participants
tunes
tutor
musicians
repertoire
fiddle
session
scottish
sessions
participatory
activities
organisation
groups
individuals
skills
context
organisations
contexts
learners
notation
tradition
glasgow
revival
formal
shared
transmission
irish
players
instrument
oxford
oral
activity
focus
listening
settings
pedagogy
specific
wider
opportunities
musician
journal
pedagogical
informal
lessons
adult
competence
idiom
key
Year:
2022
Language:
english
File:
PDF, 10.66 MB
Your tags:
0
/
5.0
english, 2022
3
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
Mingshi Wu
,
Jackson Sippe
,
Danesh Sivakumar
,
Jack Burg
,
Peter Anderson
,
Xiaokang Wang
,
Kevin Bock
,
Amir Houmansadr
,
Dave Levin
,
Eric Wustrow
gfw
traffic
blocking
connections
bytes
censorship
blocked
byte
server
printable
random
packet
shadowsocks
circumvention
active
affected
bits
client
payload
tcp
censor
encrypted
fully
probing
gfw’s
protocols
servers
tls
ascii
probes
github.com
exempt
network
exemption
algorithm
detection
experiment
port
protocol
fraction
packets
analysis
popcount
security
developers
inferred
entropy
exempted
ips
ases
Year:
2023
Language:
english
File:
PDF, 851 KB
Your tags:
5.0
/
5.0
english, 2023
4
Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship
Zhongjie Wang
,
Yue Cao
,
Zhiyun Qian
,
Chengyu Song & Srikanth V. Krishnamurthy
gfw
packets
packet
tcp
server
insertion
tcb
censorship
evasion
ack
rst
middleboxes
dns
client
intang
network
strategy
measurement
failure
path
teardown
vantage
cases
failures
reset
checksum
linux
sensitive
analysis
nids
rates
behaviors
devices
ignore
imc
servers
evolved
rate
traffic
acm
doi.org
keyword
measurements
november
systems
techniques
websites
conference
existing
flag
Language:
english
File:
PDF, 739 KB
Your tags:
0
/
5.0
english
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×