Joss Wright
Zitiert von
Zitiert von
Regional Variation in Chinese Internet Filtering
J Wright
Information, Communication & Society 17 (1), 121-141, 2014
Platform Criminalism: The 'Last-Mile' Geography of the Darknet Market Supply Chain
M Dittus, J Wright, M Graham
WWW '18 Proceedings of the 2018 World Wide Web Conference, 277-286, 2018
Emerging illegal wildlife trade issues: A global horizon scan
N Esmail, BC Wintle, M t Sas‐Rolfes, A Athanas, CM Beale, Z Bending, ...
Conservation Letters 13 (4), e12715, 2020
Making messy data work for conservation
ADM Dobson, EJ Milner-Gulland, NJ Aebischer, CM Beale, R Brozovic, ...
One Earth 2 (5), 455-465, 2020
An Internet with BRICS Characteristics: Data Sovereignty and the Balkanisation of the Internet
D Polatin-Reuben, J Wright
4th USENIX Workshop on Free and Open Communications on the Internet (FOCI '14), 2014
Poisoning the Well: Exploring the Great Firewall's Poisoned DNS Responses
O Farnan, A Darer, J Wright
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics.
J Wright, T de Souza, I Brown
FOCI, 2011
Internet filtering trends in western liberal democracies: French and German regulatory debates
Y Breindl, J Wright
FOCI 12, 2nd, 2012
Identifying the routes by which children view pornography online: implications for future policy-makers seeking to limit viewing
V Nash, JR Adler, MAH Horvath, S Livingstone, C Marston, G Owen, ...
Department for Culture, Media and Sport, 2015
FilteredWeb: A framework for the automated search-based discovery of blocked URLs
A Darer, O Farnan, J Wright
2017 Network Traffic Measurement and Analysis Conference (TMA), 1-9, 2017
Towards measuring resilience in anonymous communication networks
F Shirazi, C Diaz, J Wright
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 95-99, 2015
Strategic advertising of online news articles as an intervention to influence wildlife product consumers
H Doughty, J Wright, D Veríssimo, JSH Lee, K Oliver, EJ Milner‐Gulland
Conservation Science and Practice 2 (10), e272, 2020
Ethical privacy guidelines for mobile connectivity measurements
B Zevenbergen, I Brown, J Wright, D Erdos
Available at SSRN 2356824, 2013
On Identifying Anomalies in Tor Usage with Applications in Detecting Internet Censorship
J Wright, A Darer, O Farnan
Proceedings of the 10th ACM Conference on Web Science, 87-96, 2018
Characterising Anonymity Systems
J Wright
University of York, 2007
Formalizing anonymity: A review
J Wright, S Stepney, JA Clark, JL Jacob
Department of Computer Science, University of York, 2005
Automated Discovery of Internet Censorship by Web Crawling
A Darer, O Farnan, J Wright
Proceedings of the 10th ACM Conference on Web Science, 2018
Phishing with a darknet: Imitation of onion services
F Barr-Smith, J Wright
2020 APWG Symposium on Electronic Crime Research (eCrime), 1-13, 2020
Analysing Censorship Circumvention with VPNs via DNS Cache Snooping
O Farnan, J Wright, A Darer
4th International Workshop on Traffic Measurements for Cybersecurity (WTMC 2019), 2019
A practical complexity-theoretic analysis of mix systems
DV Pham, J Wright, D Kesdogan
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20