Search Results

1 - 6 of 6 items :

  • "Human rights" x
  • Databases and Data Mining x
Clear All
Social Engineering Attacks on Government Opponents: Target Perspectives

://www.mideastmedia.org/survey/2015/ [18] H. Choi, B. B. Zhu, and H. Lee, “Detecting malicious web links and identifying their attack types.” USENIX Conference on Web Application Development 2011, 2011. [Online]. Available: http://research.microsoft.com/apps/pubs/default.aspx?id=193308 [19] S. Afroz and R. Greenstadt, “Phishzoo: Detecting phishing websites by looking at them,” in Fifth IEEE International Conference on Semantic Computing (ICSC) . IEEE, 2011, pp. 368–375. [20] “Reflecting on Ten Years of Practice: The Challenges of Digital Security Training for Human Rights

Open access
Visualization of Disciplinary Profiles: Enhanced Science Overlay Maps

London School Economics & Political Science) OR (LSE AND London School Economics & Political Science) OR (LSE CTR STUDY HUMAN RIGHTS AND London School Economics & Political Science) OR (LSE DEPT INT RELAT AND London School Economics & Political Science) OR (LSE FINANCIAL MKT GRP AND London School Economics & Political Science) OR (LSE GENDER INST AND London School Economics & Political Science) OR (LSE GLOBAL GOVERNANCE AND London School Economics & Political Science) OR (LSE HLTH AND London School Economics & Political Science) OR (LSE HLTH SOCIAL CARE AND London

Open access
Toward Mending Two Nation-Scale Brokered Identification Systems

(6):644–654, 1976. [14] European Court of Human Rights. European Convention on Human Rights, Entry into force on June 2010. (As amended by Protocols No. 11 and 14; supplemented by Protocols Nos. 1,4,6,7 and 13.) PDF file (30 pages) – echr.coe.int website. SHA256: . [15] Federal Chief Information Officers Council and Federal Enterprise Architecture. Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance – Version 2.0, December 2, 2011. PDF file (478 pages) – idmanagement.gov website. SHA256: . [16] T. K. Frederiksen, T

Open access
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments

. https://metrics.torproject.org/ . Accessed September 2018. [71] The Tor Project. Who Uses Tor? https://www.torproject.org/about/torusers.html.en . Accessed September 2018. [72] United Nations. Universal Declaration of Human Rights (Article 12), 1948. http://www.un.org/en/universal-declaration-human-rights/ . Accessed September 2018. [73] C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In 20th Network and Distributed System Security Symposium (NDSS) , 2013. [74] D. S. Wallach. A Survey of Peer

Open access
Analyzing the Great Firewall of China Over Space and Time

=cn&events=off. [41] Tokachu. The not-so-great firewall of China. 2600 Magazine, Winter 2006-2007. [42] TorStatus. Tor network status. http://torstatus.blutmagie. de. [43] G. Walton. China’s golden shield : corporations and the development of surveillance technology in the People’s Republic of China. International Centre for Human Rights and Democratic Development, 2001. [44] Y. A. Wang, C. Huang, J. Li, and K. W. Ross. Queen: Estimating packet loss rate between arbitrary internet hosts. In Passive and Active Network Measurement

Open access
Individual versus Organizational Computer Security and Privacy Concerns in Journalism

Times, February 2013. [Online]. Available: http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-ofmedia-hacked-by-the-chinese.html?_r=0 [6] -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attackby-china-hackers.html?ref=technology [7] Human Rights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American

Open access