{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T23:27:03Z","timestamp":1776814023898,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642192593","type":"print"},{"value":"9783642192609","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19260-9_14","type":"book-chapter","created":{"date-parts":[[2011,3,11]],"date-time":"2011-03-11T00:56:55Z","timestamp":1299805015000},"page":"133-142","source":"Crossref","is-referenced-by-count":72,"title":["Internet Censorship in China: Where Does the Filtering Occur?"],"prefix":"10.1007","author":[{"given":"Xueyang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Z. Morley","family":"Mao","sequence":"additional","affiliation":[]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"The Great Firewall Revealed, \n                  \n                    http:\/\/www.internetfreedom.org\/files\/WhitePaper\/ChinaGreatFirewallRevealed.pdf"},{"key":"14_CR2","unstructured":"China\u2019s Great Firewall spreads overseas, \n                  \n                    http:\/\/www.networkworld.com\/news\/2010\/032510-chinas-great-firewall-spreads.html"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11957454_2","volume-title":"Privacy Enhancing Technologies","author":"R. Clayton","year":"2006","unstructured":"Clayton, R., Murdoch, S., Watson, R.: Ignoring the Great Firewall of China. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 20\u201335. Springer, Heidelberg (2006)"},{"key":"14_CR4","unstructured":"Crandall, J., Barr, E.: ConceptDoppler: A Weather Tracker for Internet Censorship. In. In: 14th ACM Conference on Computer and Communications Security (2007)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Park, J., Crandall, J.: Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China. In. In: The Proceedings of the 30th International Conference on Distributed Computing Systems (2010)","DOI":"10.1109\/ICDCS.2010.46"},{"key":"14_CR6","unstructured":"APNIC delegated internet number resource, \n                  \n                    http:\/\/ftp.apnic.net\/stats\/apnic\/delegated-apnic-latest"},{"key":"14_CR7","unstructured":"University of Oregon Route Views Archive Project, \n                  \n                    http:\/\/archive.routeviews.org\/"},{"key":"14_CR8","unstructured":"RIPE NCC Projects, \n                  \n                    http:\/\/www.ripe.net\/projects\/ris\/rawdata.html"},{"key":"14_CR9","unstructured":"Team Cymru, \n                  \n                    http:\/\/www.team-cymru.org\/Services\/ip-to-asn.html"},{"key":"14_CR10","unstructured":"The Central People\u2019s Government of the People\u2019s Republic of China, \n                  \n                    http:\/\/www.gov.cn\/zwgk\/2008-04\/23\/content_952239.htm"},{"key":"14_CR11","unstructured":"Dao Hang Wang, \n                  \n                    http:\/\/www.daohang.com\/"},{"key":"14_CR12","unstructured":"China Comservice, \n                  \n                    http:\/\/www.chinaccs.com.hk\/eng\/about\/history.htm"},{"key":"14_CR13","unstructured":"The 26th Statistical Reports on the Internet Development in China, \n                  \n                    http:\/\/www.cnnic.cn\/uploadfiles\/pdf\/2010\/7\/15\/100708.pdf"},{"key":"14_CR14","unstructured":"PlanetLab, \n                  \n                    http:\/\/www.planet-lab.org"},{"key":"14_CR15","unstructured":"The Connection Has Been Reset, \n                  \n                    http:\/\/msl1.mit.edu\/furdlog\/docs\/atlantic\/2008-03_atlantic_fallows_chinese_firewall.pdf"},{"key":"14_CR16","unstructured":"CIDR Report, \n                  \n                    http:\/\/www.cidr-report.org\/as2.0\/"},{"key":"14_CR17","unstructured":"Chunzhen IP geolocation database, \n                  \n                    http:\/\/www.cz88.net"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19260-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T06:25:44Z","timestamp":1558419944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19260-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192593","9783642192609"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19260-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}