Targeted threat index: Characterizing and quantifying politically-motivated targeted malware S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ... 23rd {USENIX} Security Symposium ({USENIX} Security 14), 527-541, 2014 | 75 | 2014 |
A method for identifying and confirming the use of URL filtering products for censorship J Dalek, B Haselton, H Noman, A Senft, M Crete-Nishihata, P Gill, ... Proceedings of the 2013 conference on Internet measurement conference, 23-30, 2013 | 58 | 2013 |
Characterizing web censorship worldwide: Another look at the opennet initiative data P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015 | 55 | 2015 |
Every rose has its thorn: Censorship and surveillance on social video platforms in china J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall 5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015 | 48 | 2015 |
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ... First Monday, 2013 | 42 | 2013 |
Not By Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls M Crete-Nishihata, R Deibert, A Senft IEEE, 2013 | 23 | 2013 |
The kingdom came to Canada: How Saudi-linked digital espionage reached Canadian soil B Marczak, J Scott-Railton, A Senft, B Abdul Razzak, R Deibert | 15 | 2018 |
Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads? B Marczak, J Dalek, S McKune, A Senft, J Scott-Railton, R Deibert | 13 | 2018 |
Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune, LPG Softpedia The Citizen Lab, 2015 | 13 | 2015 |
Information controls during military operations: The case of Yemen during the 2015 political and armed conflict J Dalek, R Deibert, S McKune, P Gill, N Noor, A Senft | 13 | 2015 |
Planet Netsweeper J Dalek, L Gill, B Marczak, S McKune, N Noor, J Oliver, J Penney, A Senft, ... | 9 | 2018 |
Baidu’s and don’ts: privacy and security issues in Baidu browser J Knockel, S McKune, A Senft | 9 | 2016 |
Privacy and Security Issues in BAT Web Browsers J Knockel, A Senft, R Deibert 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)}, 2016 | 6 | 2016 |
Bad Traffic B Marczak, J Dalek, S McKune, A Senft, J Scott-Railton, R Deibert Rep. Bad Traffic. Citizen Lab. https://citizenlab. ca/2018/03/bad-traffic …, 2018 | 5 | 2018 |
A tough nut to crack: A further look at privacy and security issues in UC browser J Knockel, A Senft, R Deibert | 5 | 2016 |
Psychological and Emotional War: Digital Transnational Repression in Canada N Al-Jizawi, S Anstis, S Barnett, S Chan, N Leonard, A Senft, R Deibert | 4 | 2022 |
Censors get smart: Evidence from Psiphon in Iran R Deibert, J Oliver, A Senft Review of Policy Research 36 (3), 341-356, 2019 | 4 | 2019 |
Tender Confirmed, Rights at Risk: Verifying Netsweeper in Bahrain J Dalek, R Deibert, B Marczak, S McKune, H Noman, I Poetranto, A Senft | 4 | 2016 |
Internet Governance During Crisis: The Changing Landscape of Thailand I Poetranto, A Senft GigaNet: Global Internet Governance Academic Network, Annual Symposium, 2016 | 3 | 2016 |
Characterizing censorship of web content worldwide P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman | 2 | 2008 |