Academic literature on the topic 'Great Firewall'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Great Firewall.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Great Firewall"

1

Jagani, Aishwarya. "India’s Great Firewall." Index on Censorship 52, no. 1 (April 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mulvenon, James C., and Michael S. Chase. "Breaching the Great Firewall." Journal of E-Government 2, no. 4 (July 31, 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Lena L. "Behind the ‘Great Firewall’." Convergence: The International Journal of Research into New Media Technologies 12, no. 3 (August 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors." Highlights in Science, Engineering and Technology 85 (March 13, 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.

Full text
Abstract:
A firewall serves as a crucial computer program designed to block malicious software, thereby safeguarding the user's system. It helps prevent the unauthorized dissemination of personal information and the incursion of harmful viruses. Taking inspiration from China's "Great Firewall"—a sophisticated system utilizing advanced software and hardware to automatically filter, censor, and monitor internet content—this research aims to devise a router-based firewall system capable of autonomously shielding users' computers from viruses and unauthorized websites. A comprehensive questionnaire was deployed to unearth the predominant sources of information leakage among computer users and ascertain the role of firewalls within computer systems. The analytical findings underscore that the majority of information leakage security risks stem from a significant lack of personal privacy awareness and a deficient understanding of firewall security systems. The proposed firewall system harnesses router-based control to address the limitations inherent in PC software-based firmware systems. This innovation enhances the control of viral threats and the prevention of user privacy leaks. Serving as a tangible barrier, the router-based firewall obstructs the route of viruses or malevolent programs before reaching the user's computer. This strategic design substantially reduces user intervention, ensuring the continuous operation of the firewall to steadfastly protect the user's computing environment.
APA, Harvard, Vancouver, ISO, and other styles
5

Hughes, Christopher R. "Google and the Great Firewall." Survival 52, no. 2 (March 25, 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Scarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’." Groundings Undergraduate 6 (April 1, 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.

Full text
Abstract:
The advent of the digital revolution has brought about a change in the nature of political engagement in China. The Internet and digital technologies have broadened the horizons of China’s net citizens and despite rigorous censorship and intervention on the part of the Chinese Communist Party (CCP); voices are being heard from behind the ‘Great Firewall’. With more than 500 million Internet users, Chinese citizens are a huge online presence, consequences of which include an explosion in blogging culture, cyber vigilantism and user-generated media content. It is clear that the Internet has empowered Chinese citizens in both the online and offline spheres. These developments have prompted scholars to contemplate whether there is a form of civil society developing in China in the wake of the digital revolution. However a culturally attuned conception of civil society must be developed in order to discuss an emerging Chinese civil society with any meaningful outcomes.
APA, Harvard, Vancouver, ISO, and other styles
7

Manaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Full text
Abstract:
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.
APA, Harvard, Vancouver, ISO, and other styles
8

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Full text
Abstract:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Ensafi, Roya, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (April 1, 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.

Full text
Abstract:
AbstractA nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using a hybrid idle scan technique that is able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel’s SYN backlog. We show that both techniques are practical by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that failures in the firewall occur throughout the entire country without any conspicuous geographical patterns.We give some evidence that routing plays a role, but other factors (such as how the GFW maintains its list of IP/port pairs to block) may also be important.
APA, Harvard, Vancouver, ISO, and other styles
10

Anderson, Daniel. "Splinternet Behind the Great Firewall of China." Queue 10, no. 11 (November 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Great Firewall"

1

Seiwald, Michael. "A detailed analysis of the follow-up scanning performed by the Great Firewall of China." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.

Full text
Abstract:
The Great Firewall of China (GFC) represents one of the most sophisticated censoring infrastructures in the world. While several aspects of the GFC including HTTP keyword filtering and DNS tampering have been studied thoroughly in the past, recent work has shown that the GFC goes to great lengths to prevent its citizens from using the Tor anonymity network. By employing the so-called follow-up scanning technique, Tor bridge relays are blocked dynamically. In this thesis, we survey previous work in the area of the GFC ranging from HTTP keyword filtering and DNS tampering, to the Tor follow-up scanning. Furthermore, additional experiments are carried out to gain a better understanding of how the follow-up scanning is implemented as well as where the filtering occurs for different protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Lovito, Monica. "Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.

Full text
Abstract:
Il lavoro è incentrato sull'analisi del percorso storico delle riforme in CIna nel campo dell'informazione. Si presente in caso dell'attivismo online come strumento di partecipazione alla diffusione delle informazioni. Per ultimo, si è presentato il lavoro delle testate giornalistiche cinesi aperte all'informazione globale.
APA, Harvard, Vancouver, ISO, and other styles
3

Hsiao, Yu-Hsuan, and 蕭宇軒. "In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.

Full text
Abstract:
碩士
國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Great Firewall"

1

Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. 8th ed. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Roberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Griffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Griffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Griffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Great Firewall"

1

Clayton, Richard, Steven J. Murdoch, and Robert N. M. Watson. "Ignoring the Great Firewall of China." In Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Taylor, Monique. "Building Digital Authoritarianism: From the Great Firewall to the New IP." In China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gaufman, Elizaveta. "Cybercrime and Punishment: Security, Information War, and the Future of Runet." In The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.

Full text
Abstract:
AbstractCybersecurity à la Russe is marked by the authoritarian nature of the state that is primarily concerned by the question of regime survival. This logic motivates continuous securitization of the Internet that is framed as a potential accessory to crimes committed both by foreign and domestic actors. This chapter aims to show the discrepancies in Russian cyber politics at home and abroad, highlighting its struggle for more internet regulation that is seen by the Russian government as a panacea against perceived external attempts at regime change while exploiting digital public spaces abroad. At the same time, this chapter shows that despite seemingly formidable “cyber army” capabilities for external use, domestic surveillance and attempts to build a Great Russian Firewall are still lacking.
APA, Harvard, Vancouver, ISO, and other styles
4

Mao, Weizhun. "Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010." In Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keats, Jonathon. "Great Firewall." In Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.

Full text
Abstract:
The Chinese government declared 1996 the Year of the Internet. There wasn’t much to it: only one person in ten thousand was connected—at a modem speed of 14.4 kilobits per second—and 86 percent of the population had never encountered a computer. Even in universities email was still a novelty, haltingly introduced in 1994. Yet in one respect China was the most advanced nation on the planet. Using equipment supplied by Sun Microsystems and Cisco, the Chinese Public Security Bureau had corralled the entire country, all 3,705,000 square miles, within a fanghuo qiang, or firewall. The firewall promised to make the internet safe for autocracy. All online communication could be monitored, at least in principle, and access to any website could be denied. On February 1, 1996, Premier Li Peng signed State Council Order 195, officially placing the government “in charge of overall planning, national standardization, graded control, and the development of all areas related to the internet,” and expressly forbidding users “to endanger national security or betray state secrets.” Enforcement was arbitrary. Discipline was imposed by the dread of uncertainty. This was an inevitability, since the Public Security Bureau couldn’t possibly watch all online activity within China, let alone block every objectionable web page worldwide. Interviewed by Wired magazine, the computer engineer overseeing the fanghuo qiang bluntly explained his working policy: “You make a problem for us, and we’ll make a law for you.” In many countries such a firewall might have stifled development, but most Chinese weren’t interested in making problems. They were attracted to the internet’s dazzling potential, as advertised on billboards that encouraged them to “join the internet club, meet today’s successful people, experience the spirit of the age, drink deep of the cup of leisure.” Those who could afford a connection, which cost approximately half the monthly salary of a recent college graduate, casually referred to the fanghuo qiang as the wangguan , calmly evoking the many guan (passes) of the Great Wall as natural features of China’s wan wei wang (ten-thousand-dimensional web).
APA, Harvard, Vancouver, ISO, and other styles
6

"17. The Great Firewall." In Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gainous, Jason, Rongbin Han, Andrew W. MacDonald, and Kevin M. Wagner. "Jumping Over the Great Firewall." In Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.

Full text
Abstract:
Abstract In this chapter, we describe how the Chinese government is addressing and effectively neutralizing citizens who evade the firewall. We begin by building the framework for understanding how this development may be a threat to the Chinese government’s strategy. Indeed, our data indicate that many citizens are actually jumping the wall to gather sensitive political information. Given the obvious difficulty in measuring such sensitive activity, we employed several checks on the validity of our measure, all of which generally align with respondents’ self-reported behavior. We demonstrate that many citizens do distrust the central government and that the more internet users jump the wall, the less trusting and satisfied they are with the central government. We present evidence that there may be consequences resulting from the difficult proposition of trying to control the information flow on the other side of the firewall. The results in this chapter show that this difficulty could counteract or even overwhelm, from the point of view of the regime, the positive effect of the directed digital dissidence strategy.
APA, Harvard, Vancouver, ISO, and other styles
8

"Jumping the wall." In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Uyghurs online." In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"NoGuGe." In The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Great Firewall"

1

Pang, Sheng, Changjia Chen, and Jinkang Jia. "Session Hijack in the Great Firewall of China." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ensafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson. "Examining How the Great Firewall Discovers Hidden Circumvention Servers." In IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Comb, Matthew, and Paul A. Watters. "Peeking behind the great firewall: Privacy on Chinese file sharing networks." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Weinberg, Zachary, Diogo Barradas, and Nicolas Christin. "Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China." In WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao, and Zhang Zhipeng. "The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall." In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hillmer, Dirk. "VirTeam Tool." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.

Full text
Abstract:
Abstract The rapid evolution of information and the new potentials for communication between people, have been of great importance to the success of most organizations. Key aspects were the increased availability of computer networks and the rowing trend towards team work. People are becoming connected through the Internet. People can use the network behind their computer as a great resource for solving problems. The purpose of this research is to simplify starts of collaboration tools. Individuals will be able to establish connections on demand. The schedule of group appointments and conference schedule should be supported, therefore, all necessary information has to be provided. Also behind firewalls a secure way to allow access to these data has to be found.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Great Firewall"

1

Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, June 2008. http://dx.doi.org/10.21236/ada488175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography