Skip to main navigation Skip to search Skip to main content

Anonymity networks and access to information during conflicts: Towards a distributed network organisation

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet allows powerful hostile actors to block, censor, or redirect communication to and from specific Internet services, through a number of available techniques.

Original languageEnglish
Title of host publication2016 8th International Conference on Cyber Conflict
Subtitle of host publicationCyber Power, CyCon 2016
EditorsMaj Nikolaos Pissanidis, Henry Roigas, Matthijs A. Veenendaal
PublisherNATO CCD COE Publications
Pages263-275
Number of pages13
ISBN (Electronic)9789949954483
DOIs
Publication statusPublished - 2 Aug 2016
Externally publishedYes
Event8th International Conference on Cyber Conflict, CyCon 2016 - Tallinn, Estonia
Duration: 31 May 20163 Jun 2016

Publication series

NameInternational Conference on Cyber Conflict, CYCON
Volume2016-August
ISSN (Print)2325-5366
ISSN (Electronic)2325-5374

Conference

Conference8th International Conference on Cyber Conflict, CyCon 2016
Country/TerritoryEstonia
CityTallinn
Period31/05/163/06/16

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 9 - Industry, Innovation, and Infrastructure
    SDG 9 Industry, Innovation, and Infrastructure

Keywords

  • anonymous networks
  • DDoS
  • denial of service
  • peer-to-peer
  • Tor

Fingerprint

Dive into the research topics of 'Anonymity networks and access to information during conflicts: Towards a distributed network organisation'. Together they form a unique fingerprint.

Cite this