Adam Senft
Cited by
Cited by
Targeted threat index: Characterizing and quantifying politically-motivated targeted malware
S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ...
23rd {USENIX} Security Symposium ({USENIX} Security 14), 527-541, 2014
A method for identifying and confirming the use of URL filtering products for censorship
J Dalek, B Haselton, H Noman, A Senft, M Crete-Nishihata, P Gill, ...
Proceedings of the 2013 conference on Internet measurement conference, 23-30, 2013
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
Characterizing web censorship worldwide: Another look at the opennet initiative data
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2015
Not By Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls
M Crete-Nishihata, R Deibert, A Senft
IEEE, 2013
Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation
B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune
The Citizen Lab, 2015
The Kingdom Came to Canada
B Marczak, J Scott-Railton, A Sen, BA Razzak, R Deibert
Citizen Lab, October 2, 2018
Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
B Marczak, J Dalek, S McKune, A Senft, J Scott-Railton, R Deibert
Baidu’s and don’ts: Privacy and security issues in baidu browser
J Knockel, S McKune, A Senft
A tough nut to crack: A further look at privacy and security issues in UC browser
J Knockel, A Senft, R Deibert
Information controls during military operations: The case of Yemen during the 2015 political and armed conflict
J Dalek, R Deibert, S McKune, P Gill, N Noor, A Senft
Privacy and Security Issues in BAT Web Browsers
J Knockel, A Senft, R Deibert
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)}, 2016
Planet Netsweeper
J Dalek, L Gill, B Marczak, S McKune, N Noor, J Oliver, J Penney, A Senft, ...
Tender Confirmed, Rights at Risk: Verifying Netsweeper in Bahrain
J Dalek, R Deibert, B Marczak, S McKune, H Noman, I Poetranto, A Senft
Characterizing censorship of web content worldwide
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
Censors Get Smart: Evidence from Psiphon in Iran
R Deibert, J Oliver, A Senft
Review of Policy Research 36 (3), 341-356, 2019
Dual-Use Technologies: Network Traffic Management and Device Intrusion for Targeted Monitoring
S Anstis, S Chan, A Senft, RJ Deibert
Internet Governance During Crisis: The Changing Landscape of Thailand
I Poetranto, A Senft
GigaNet: Global Internet Governance Academic Network, Annual Symposium, 2016
Targeted Malware Attacks against NGO Linked to Attacks on Burmese Government Websites
K Kleemola, M Crete-Nishihata, A Senft, I Poetranto
The system can't perform the operation now. Try again later.
Articles 1–20