Follow
Adam Senft
Title
Cited by
Cited by
Year
Targeted Threat Index: Characterizing and Quantifying {Politically-Motivated} Targeted Malware
S Hardy, M Crete-Nishihata, K Kleemola, A Senft, B Sonne, G Wiseman, ...
23rd USENIX Security Symposium (USENIX Security 14), 527-541, 2014
792014
Characterizing web censorship worldwide: Another look at the opennet initiative data
P Gill, M Crete-Nishihata, J Dalek, S Goldberg, A Senft, G Wiseman
ACM Transactions on the Web (TWEB) 9 (1), 1-29, 2015
692015
A method for identifying and confirming the use of URL filtering products for censorship
J Dalek, B Haselton, H Noman, A Senft, M Crete-Nishihata, P Gill, ...
Proceedings of the 2013 conference on Internet measurement conference, 23-30, 2013
622013
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
592015
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
482013
The kingdom came to Canada: How Saudi-linked digital espionage reached Canadian soil
B Marczak, J Scott-Railton, A Senft, B Abdul Razzak, R Deibert
272018
Not By Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls
M Crete-Nishihata, R Deibert, A Senft
IEEE, 2013
242013
Information controls during military operations: The case of Yemen during the 2015 political and armed conflict
J Dalek, R Deibert, S McKune, P Gill, N Noor, A Senft
172015
Psychological and emotional war: Digital transnational repression in Canada
N Al-Jizawi, S Anstis, S Barnett, S Chan, N Leonard, A Senft, R Deibert
162022
Bad Traffic: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
B Marczak, J Dalek, S McKune, A Senft, J Scott-Railton, R Deibert
162018
Pay No Attention to the Server Behind the Proxy
B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune
Citizen Lab 15, 2015
162015
Planet Netsweeper
J Dalek, L Gill, B Marczak, S McKune, N Noor, J Oliver, J Penney, A Senft, ...
122018
Baidu’s and don’ts: privacy and security issues in Baidu browser
J Knockel, S McKune, A Senft
102016
Privacy and Security Issues in BAT Web Browsers
J Knockel, A Senft, R Deibert
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)}, 2016
102016
Censors get smart: Evidence from Psiphon in Iran
R Deibert, J Oliver, A Senft
Review of Policy Research 36 (3), 341-356, 2019
82019
No Access: LGBTIQ Website Censorship in Six Countries
J Dalek, N Dumlao, M Kenyon, I Poetranto, A Senft, C Wesley, A Filastò, ...
Technical Report Citizen Lab Research Report, 2021
72021
A tough nut to crack: A further look at privacy and security issues in UC browser
J Knockel, A Senft, R Deibert
72016
Mapping FinFisher’s Continuing Proliferation
B Marczak, J Scott-Railton, A Senft, I Poetranto, S McKune
The Citizen Lab, December 11, 2019
52019
A chatty squirrel: Privacy and security issues with uc browser
J Dalek, K Kleemola, A Senft, C Parsons, A Hilts, S McKune, JQ Ng, ...
The Citizen Lab, May 21, 2015
52015
Digital transnational repression
N Al-Jizawi, S Antis, S Chan, A Senft, RJ Deibert
Citizen Lab, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20