Parsons, 2013 - Google Patents
Deep packet inspection and its predecessorsParsons, 2013
View PDF- Document ID
- 17798160544488861020
- Author
- Parsons C
- Publication year
- Publication venue
- Technology, Thoughts, and Trinkets
External Links
Snippet
2 Christopher Parsons is a PhD candidate in the Department of Political Science at the University of Victoria. His research interests focus on how privacy (particularly informational privacy, expressive privacy and accessibility privacy) is affected by digitally mediated …
- 238000007689 inspection 0 title description 45
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9118702B2 (en) | System and method for generating and refining cyber threat intelligence data | |
| Almadhoor et al. | Social media and cybercrimes | |
| US20060026678A1 (en) | System and method of characterizing and managing electronic traffic | |
| US20080282338A1 (en) | System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network | |
| US20100235918A1 (en) | Method and Apparatus for Phishing and Leeching Vulnerability Detection | |
| US8713674B1 (en) | Systems and methods for excluding undesirable network transactions | |
| US20120180120A1 (en) | System for data leak prevention from networks using context sensitive firewall | |
| Deliri et al. | Security and Privacy Issues in Social Networks. | |
| Stalla-Bourdillon et al. | From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy… The case of deep packet inspection technologies | |
| Haber et al. | Attack vectors | |
| Parsons | Deep packet inspection and its predecessors | |
| Daly | The legality of deep packet inspection | |
| Parsons | The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers? | |
| CA2747584C (en) | System and method for generating and refining cyber threat intelligence data | |
| Varadharajan | Internet filtering-issues and challenges | |
| Ulfah et al. | Blocking pornography sites on the internet private and university access | |
| Roberts et al. | The EU data retention directive in an era of internet surveillance | |
| Kundu et al. | Analysis of security and privacy in social media platforms | |
| Ahmed et al. | Advanced security: The application social media and their security | |
| Corwin | Deep packet inspection: Shaping the Internet and the implications on privacy and security | |
| Mohtasebi et al. | A mitigation approach to the privacy and malware threats of social network services | |
| Khattak | Characterization of Internet censorship from multiple perspectives | |
| Morgus et al. | The Idealized Internet vs. Internet Realities (Version 1.0) | |
| Hyland | Internet censorship: An integrative review of technologies employed to limit access to the internet, monitor user actions, and their effects on culture | |
| Nicoletti | Content filtering |