skip to main content
research-article
Free Access

Internet freedom in West Africa: technical support for journalists and democracy advocates

Published:24 April 2018Publication History
Skip Abstract Section

Abstract

The U.S. State Department's Internet Freedom agenda is being adapted to help them communicate without DNS and IP address filtering.

References

  1. Dietrich, C.J., Rossow, C., Felix, Freiling, C., Bos, H., Van Steen, M., and Pohlmann, N. On botnets that use DNS for command and control. In Proceedings of the Seventh European Conference on Computer Network Defense (Gothenburg, Sweden, Sept. 6--7). IEEE Computer Society Press, 2011, 9--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Fu, Y., Yu, L., Hambolu, O., Ozcelik, I., Husain, B., Sun, J., Sapra, K., Du, D., Beasley, C., and Brooks, R. Stealthy domain-generation algorithms. IEEE Transactions on Information Forensics and Security 12, 6 (June 2017), 1430--1443. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hagen, J. and Luo, S. Why Domain-Generating Algorithms? Trend Micro, Aug. 18, 2016; http://blog.trendmicro.com/domain-generating-algorithms-dgasGoogle ScholarGoogle Scholar
  4. Roberts, H., Zuckerman, E., and Palfrey, J. Circumvention Landscape Report: Methods, Uses, and Tools. The Berkman Center for Internet & Society at Harvard University, Cambridge, MA, 2007; http://cyber.harvard.edu/sites/cyber.harvard.edu/files/2007_Circumvention_Landscape.pdfGoogle ScholarGoogle Scholar
  5. Silva, S.S.C., Silva, R.M.P., Pinto R.C.G., and Salles, R.M. Botnets: A survey. Computer Networks 57, 2 (Feb. 2013), 378--403. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Internet freedom in West Africa: technical support for journalists and democracy advocates

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 61, Issue 5
              May 2018
              104 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/3210350
              Issue’s Table of Contents

              Copyright © 2018 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 24 April 2018

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format