All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda

LH Lee, T Braud, PY Zhou, L Wang… - … and trends® in …, 2024 - nowpublishers.com
Since the popularisation of the Internet in the 1990s, the cyberspace has kept evolving. We
have created various computer-mediated virtual environments, including social networks …

Censored planet: An internet-wide, longitudinal censorship observatory

R Sundara Raman, P Shenoy, K Kohls… - proceedings of the 2020 …, 2020 - dl.acm.org
Remote censorship measurement techniques offer capabilities for monitoring Internet
reachability around the world. However, operating these techniques continuously is labor …

Repression technology: Internet accessibility and state violence

AR Gohdes - American Journal of Political Science, 2020 - Wiley Online Library
This article offers a first subnational analysis of the relationship between states' dynamic
control of Internet access and their use of violent repression. I argue that where governments …

Global measurement of {DNS} manipulation

P Pearce, B Jones, F Li, R Ensafi, N Feamster… - 26th USENIX Security …, 2017 - usenix.org
Despite the pervasive nature of Internet censorship and the continuous evolution of how and
where censorship is applied, measurements of censorship remain comparatively sparse …

ICLab: A global, longitudinal internet censorship measurement platform

AA Niaki, S Cho, Z Weinberg, NP Hoang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …

How Great is the Great Firewall? Measuring China's {DNS} Censorship

NP Hoang, AA Niaki, J Dalek, J Knockel, P Lin… - 30th USENIX Security …, 2021 - usenix.org
The DNS filtering apparatus of China's Great Firewall (GFW) has evolved considerably over
the past two decades. However, most prior studies of China's DNS filtering were performed …

[PDF][PDF] Decentralized control: A case study of russia

R Ramesh, RS Raman, M Bernhard… - Network and …, 2020 - par.nsf.gov
Until now, censorship research has largely focused on highly centralized networks that rely
on government-run technical choke-points, such as the Great Firewall of China. Although it …

Augur: Internet-wide detection of connectivity disruptions

P Pearce, R Ensafi, F Li, N Feamster… - 2017 IEEE Symposium …, 2017 - ieeexplore.ieee.org
Anecdotes, news reports, and policy briefings collectively suggest that Internet censorship
practices are pervasive. The scale and diversity of Internet censorship practices makes it …

Poking a hole in the wall: Efficient censorship-resistant Internet communications by parasitizing on WebRTC

D Barradas, N Santos, L Rodrigues… - Proceedings of the 2020 …, 2020 - dl.acm.org
Many censorship circumvention tools rely on trusted proxies that allow users within
censored regions to access blocked Internet content by tunneling it through a covert channel …

Where the light gets in: Analyzing web censorship mechanisms in india

TK Yadav, A Sinha, D Gosain, PK Sharma… - Proceedings of the …, 2018 - dl.acm.org
In this work we present a detailed study of the Internet censorship mechanism in India. We
consolidated a list of potentially blocked websites from various public sources to assess …