Targeted Threat Index: Characterizing and Quantifying {Politically-Motivated} Targeted Malware S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ... 23rd USENIX Security Symposium (USENIX Security 14), 527-541, 2014 | 79 | 2014 |
Characterizing web censorship worldwide: Another look at the opennet initiative data P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015 | 69 | 2015 |
A method for identifying and confirming the use of URL filtering products for censorship J Dalek, B Haselton, H Noman, A Senft, M Crete-Nishihata, P Gill, ... Proceedings of the 2013 conference on Internet measurement conference, 23-30, 2013 | 62 | 2013 |
Every rose has its thorn: Censorship and surveillance on social video platforms in china J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015 | 59 | 2015 |
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ... First Monday, 2013 | 48 | 2013 |
The kingdom came to Canada: How Saudi-linked digital espionage reached Canadian soil B Marczak, J Scott-Railton, A Senft, B Abdul Razzak, R Deibert | 27 | 2018 |
Not By Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls M Crete-Nishihata, R Deibert, A Senft IEEE, 2013 | 24 | 2013 |
Information controls during military operations: The case of Yemen during the 2015 political and armed conflict J Dalek, R Deibert, S McKune, P Gill, N Noor, A Senft | 17 | 2015 |
Psychological and emotional war: Digital transnational repression in Canada N Al-Jizawi, S Anstis, S Barnett, S Chan, N Leonard, A Senft, R Deibert | 16 | 2022 |
Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads? B Marczak, J Dalek, S McKune, A Senft, J Scott-Railton, R Deibert | 16 | 2018 |
Pay No Attention to the Server Behind the Proxy B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune Citizen Lab 15, 2015 | 16 | 2015 |
Planet Netsweeper J Dalek, L Gill, B Marczak, S McKune, N Noor, J Oliver, J Penney, A Senft, ... | 12 | 2018 |
Baidu’s and don’ts: privacy and security issues in Baidu browser J Knockel, S McKune, A Senft | 10 | 2016 |
Privacy and Security Issues in BAT Web Browsers J Knockel, A Senft, R Deibert 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)}, 2016 | 10 | 2016 |
Censors get smart: Evidence from Psiphon in Iran R Deibert, J Oliver, A Senft Review of Policy Research 36 (3), 341-356, 2019 | 8 | 2019 |
No Access: LGBTIQ Website Censorship in Six Countries J Dalek, N Dumlao, M Kenyon, I Poetranto, A Senft, C Wesley, A Filastò, ... Technical Report Citizen Lab Research Report, 2021 | 7 | 2021 |
A tough nut to crack: A further look at privacy and security issues in UC browser J Knockel, A Senft, R Deibert | 7 | 2016 |
Mapping FinFisher’s Continuing Proliferation B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune The Citizen Lab, December 11, 2019 | 5 | 2019 |
A chatty squirrel: Privacy and security issues with uc browser J Dalek, K Kleemola, A Senft, C Parsons, A Hilts, S McKune, JQ Ng, ... The Citizen Lab, May 21, 2015 | 5 | 2015 |
Digital transnational repression N Al-Jizawi, S Antis, S Chan, A Senft, RJ Deibert Citizen Lab, 2020 | 4 | 2020 |