Abstract
Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet allows powerful hostile actors to block, censor, or redirect communication to and from specific Internet services, through a number of available techniques.
| Original language | English |
|---|---|
| Title of host publication | 2016 8th International Conference on Cyber Conflict |
| Subtitle of host publication | Cyber Power, CyCon 2016 |
| Editors | Maj Nikolaos Pissanidis, Henry Roigas, Matthijs A. Veenendaal |
| Publisher | NATO CCD COE Publications |
| Pages | 263-275 |
| Number of pages | 13 |
| ISBN (Electronic) | 9789949954483 |
| DOIs | |
| Publication status | Published - 2 Aug 2016 |
| Externally published | Yes |
| Event | 8th International Conference on Cyber Conflict, CyCon 2016 - Tallinn, Estonia Duration: 31 May 2016 → 3 Jun 2016 |
Publication series
| Name | International Conference on Cyber Conflict, CYCON |
|---|---|
| Volume | 2016-August |
| ISSN (Print) | 2325-5366 |
| ISSN (Electronic) | 2325-5374 |
Conference
| Conference | 8th International Conference on Cyber Conflict, CyCon 2016 |
|---|---|
| Country/Territory | Estonia |
| City | Tallinn |
| Period | 31/05/16 → 3/06/16 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
Keywords
- anonymous networks
- DDoS
- denial of service
- peer-to-peer
- Tor
Fingerprint
Dive into the research topics of 'Anonymity networks and access to information during conflicts: Towards a distributed network organisation'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver