{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:00:57Z","timestamp":1743094857214,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":56,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662643303"},{"type":"electronic","value":"9783662643310"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_22","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T23:16:12Z","timestamp":1634944572000},"page":"417-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lost in Transmission: Investigating Filtering of COVID-19 Websites"],"prefix":"10.1007","author":[{"given":"Anjali","family":"Vyas","sequence":"first","affiliation":[]},{"given":"Ram","family":"Sundara Raman","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Ceccio","sequence":"additional","affiliation":[]},{"given":"Philipp M.","family":"Lutscher","sequence":"additional","affiliation":[]},{"given":"Roya","family":"Ensafi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"22_CR1","unstructured":"Afroz, S., Fifield, D.: Timeline of Tor censorship (2007). http:\/\/www1.icsi.berkeley.edu\/~sadia\/tor_timeline.pdf"},{"key":"22_CR2","unstructured":"Alexa Internet, Inc., Alexa Top 1,000,000 Sites. http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Allcott, H., Gentzkow, M., Yu, C.: Trends in the diffusion of misinformation on social media. Research & Politics (2019)","DOI":"10.3386\/w25500"},{"key":"22_CR4","unstructured":"Anonymous. Towards a comprehensive picture of the Great Firewall\u2019s DNS censorship. In: Free and Open Communications on the Internet (FOCI) (2014)"},{"key":"22_CR5","unstructured":"Aryan, S., Aryan, H., Halderman, J.A.: Internet censorship in Iran: a first look. In: Free and Open Communications on the Internet (FOCI) (2013)"},{"key":"22_CR6","unstructured":"Brennen, J.S., Simon, F., Howard, P.N., Nielsen, R.K.: Types, sources, and claims of covid-19 misinformation. Reuters Institute (2020)"},{"key":"22_CR7","unstructured":"CheckPhish: Url Scanner to Detect Phishing in Real-time|CheckPhish. https:\/\/checkphish.ai\/"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, C., Barcel\u00f3, J., Hartnett, A.S., Kubinec, R., Messerschmidt, L.: Covid-19 government response event dataset. Nature Hum. Behav. 4, 756\u2013768 (2020)","DOI":"10.1038\/s41562-020-0909-7"},{"key":"22_CR9","unstructured":"Cinelli, M., et al.: The covid-19 social media infodemic. arXiv preprint http:\/\/arxiv.org\/abs\/2003.05004 (2020)"},{"key":"22_CR10","unstructured":"Citizen Lab. Block test list. https:\/\/github.com\/citizenlab\/test-lists"},{"key":"22_CR11","unstructured":"Coppedge, M., et al.: V-dem codebook v. 10 (2020). https:\/\/www.v-dem.net\/media\/filer_public\/28\/14\/28140582-43d6-4940-948f-a2df84a31893\/v-dem_codebook_v10.pdf"},{"key":"22_CR12","unstructured":"Crete-Nishihata, M., Dalek, J., Knockel, J., Lawford, N., Wesley, C., Zhou, M.: Censored contagion II: a timeline of information control on Chinese social media during COVID-19 (2020). https:\/\/citizenlab.ca\/2020\/08\/censored-contagion-ii-a-timeline-of-information-control-on-chinese-social-media-during-covid-19\/"},{"key":"22_CR13","unstructured":"Dahir, A.L.: Internet shutdowns are costing African governments more than we thought. https:\/\/qz.com\/1089749\/internet-shutdowns-are-increasingly-taking-a-toll-on-africas-economies\/"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Dainotti, A., et al.: Analysis of country-wide internet outages caused by censorship. In: ACM Internet Measurement Conference (IMC) (2011)","DOI":"10.1145\/2068816.2068818"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by Internet-wide scanning. In: Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security (2015)","DOI":"10.1145\/2810103.2813703"},{"key":"22_CR16","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security Symposium (2013)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Ensafi, R., Winter, P., Mueen, A., Crandall, J.R.: Analyzing the great firewall of China over space and time. In: Proceedings on Privacy Enhancing Technologies (PETS) (2015)","DOI":"10.1515\/popets-2015-0005"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: What types of COVID-19 conspiracies are populated by twitter bots? First Monday (2020)","DOI":"10.5210\/fm.v25i6.10633"},{"key":"22_CR19","unstructured":"FortiNet: Fortiguard labs web filter. https:\/\/fortiguard.com\/webfilter"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Gharaibeh, M., Shah, A., Huffaker, B., Zhang, H., Ensafi, R., Papadopoulos, C.: A look at infrastructure geolocation in public and commercial databases. In: ACM Internet Measurement Conference (IMC) (2017)","DOI":"10.1145\/3131365.3131380"},{"key":"22_CR21","unstructured":"Coronavirus search trends - google trends. https:\/\/trends.google.com\/trends\/story\/US_cu_4Rjdh3ABAABMHM_en"},{"key":"22_CR22","unstructured":"Jerreat, J.: Coronavirus the new scapegoat for media censorship, rights groups say (2020). https:\/\/www.voanews.com\/press-freedom\/coronavirus-new-scapegoat-media-censorship-rights-groups-say"},{"key":"22_CR23","unstructured":"Johns Hopkins University: Coronavirus Resource Center. Covid-19 dashboard by the center for systems science and engineering (csse) at johns hopkins university (jhu). https:\/\/coronavirus.jhu.edu\/map.html"},{"key":"22_CR24","unstructured":"Kyaw, P.P., Xynou, M., Filast\u00f2, A.: Myanmar blocks \u201cfake news\u201d websites amid covid-19 pandemic. https:\/\/ooni.org\/post\/2020-myanmar-blocks-websites-amid-covid19\/"},{"key":"22_CR25","unstructured":"Lachapelle, J., L\u00fchrmann, A., Maerz, S.F.: An update on pandemic backsliding: Democracy four months after the beginning of the covid-19 pandemic. Policy Brief, V-Dem Institute (2020)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"MacKinnon, R.: China\u2019s censorship 2.0: how companies censor bloggers. First Monday (2009)","DOI":"10.5210\/fm.v14i2.2378"},{"key":"22_CR27","unstructured":"MaxMind. https:\/\/www.maxmind.com\/"},{"key":"22_CR28","unstructured":"Ofcom: Half of UK adults exposed to false claims about coronavirus (2020). https:\/\/www.ofcom.org.uk\/about-ofcom\/latest\/media\/media-releases\/2020\/half-of-uk-adults-exposed-to-false-claims-about-coronavirus"},{"key":"22_CR29","unstructured":"Palo Alto Networks. Test a site. https:\/\/urlfiltering.paloaltonetworks.com\/"},{"key":"22_CR30","unstructured":"PC Magazine: Phishing attacks increase 350 percent amid covid-19 quarantine. https:\/\/in.pcmag.com\/privacy\/135635\/phishing-attacks-increase-350-percent-amid-covid-19-quarantine"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Pearce, P., Ensafi, R., Li, F., Feamster, N., Paxson, V.: Augur: internet-wide detection of connectivity disruptions. In: IEEE Symposium on Security and Privacy (S&P), May 2017","DOI":"10.1109\/SP.2017.55"},{"key":"22_CR32","unstructured":"Pearce, P., et al.: Global measurement of DNS manipulation. In: USENIX Security Symposium (2017)"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Peng, P., Yang, L., Song, L., Wang, G.: Opening the blackbox of virustotal: analyzing online phishing scan engines. In: ACM Internet Measurement Conference (IMC) (2019)","DOI":"10.1145\/3355369.3355585"},{"key":"22_CR34","doi-asserted-by":"crossref","unstructured":"Radu, R.: Fighting the \u2018infodemic\u2019: legal responses to COVID-19 disinformation. Social Media+Society (2020)","DOI":"10.1177\/2056305120948190"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Ramesh, R., et al.: Decentralized control: a case study of Russia. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2020)","DOI":"10.14722\/ndss.2020.23098"},{"key":"22_CR36","unstructured":"Reporters Without Borders: Middle east governments clamp down on coronavirus coverage (2020). https:\/\/rsf.org\/en\/news\/middle-east-governments-clamp-down-coronavirus-coverage"},{"key":"22_CR37","unstructured":"University of Oregon Route Views Project. www.routeviews.org"},{"key":"22_CR38","unstructured":"Ruan, L., Knockel, J., Crete-Nishihata, M.: Censored contagion: how information on the coronavirus is managed on Chinese social media (2020). https:\/\/citizenlab.ca\/2020\/03\/censored-contagion-how-information-on-the-coronavirus-is-managed-on-chinese-social-media\/"},{"key":"22_CR39","unstructured":"Scott, W., Anderson, T., Kohno, T., Krishnamurthy, A.: Satellite: joint analysis of CDNs and network-level interference. In: USENIX Annual Technical Conference (ATC) (2016)"},{"key":"22_CR40","unstructured":"SeleniumHQ Browser Automation. www.selenium.dev"},{"key":"22_CR41","unstructured":"Singh, L., et al.: A first look at COVID-19 information and misinformation sharing on Twitter (2020)"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Sundara Raman, R., Evdokimov, L. , Wustrow, E., Halderman, A., Ensafi, R.: Investigating large scale HTTPS interception in Kazakhstan. In: Internet Measurement Conference (IMC). ACM (2020)","DOI":"10.1145\/3419394.3423665"},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"Sundara Raman, R., Shenoy, P., Kohls, K., Ensafi, R.: Censored planet: an internet-wide, longitudinal censorship observatory. In: ACM SIGSAC Conference on Computer and Communications Security (CCS) (2020)","DOI":"10.1145\/3372297.3417883"},{"key":"22_CR44","doi-asserted-by":"crossref","unstructured":"Sundara Raman, R., et al.: Measuring the deployment of network censorship filters at global scale. In: Network and Distributed System Security Symposium (NDSS) (2020)","DOI":"10.14722\/ndss.2020.23099"},{"key":"22_CR45","unstructured":"The Tor Project. OONI: Open observatory of network interference. https:\/\/ooni.torproject.org\/"},{"key":"22_CR46","unstructured":"University of Toronto. Citizen Lab. https:\/\/citizenlab.ca\/"},{"key":"22_CR47","doi-asserted-by":"crossref","unstructured":"Vallina, P., et al.: Mis-shapes, mistakes, misfits: an analysis of domain classification services. In: ACM Internet Measurement Conference (IMC) (2020)","DOI":"10.1145\/3419394.3423660"},{"key":"22_CR48","unstructured":"VanderSloot, B., McDonald, A., Scott, W., Halderman, J.A., Ensafi, R.: Quack: scalable remote measurement of application-layer censorship. In: USENIX Security Symposium (2018)"},{"key":"22_CR49","doi-asserted-by":"crossref","unstructured":"Vyas, A., Sundara Raman, R., Ceccio, N., Lutscher, P.M., Ensafi, R.: Investigating filtering of COVID-19 websites (2020). https:\/\/censoredplanet.org\/covid","DOI":"10.1007\/978-3-662-64331-0_22"},{"key":"22_CR50","unstructured":"WatchGuard. See a site\u2019s content category. https:\/\/www.watchguard.com\/help\/docs\/help-center\/en-US\/Content\/en-US\/Fireware\/services\/webblocker\/site_categories_see_websense_c.html"},{"key":"22_CR51","unstructured":"Winter, P., Lindskog, S.: How the great firewall of china is blocking tor. In: Free and Open Communications on the Internet (FOCI) (2012)"},{"key":"22_CR52","unstructured":"Wiseman, J.: European media freedom suffers under COVID-19 response (2020). https:\/\/ipi.media\/european-media-freedom-suffers-covid-19-response\/"},{"key":"22_CR53","unstructured":"World Health Organization: Coronavirus disease (COVID-19) pandemic (2020). https:\/\/www.who.int\/emergencies\/diseases\/novel-coronavirus-2019"},{"key":"22_CR54","doi-asserted-by":"crossref","unstructured":"Xu, X., Mao, Z.M., Halderman, J.A.: Internet censorship in China: where does the filtering occur? In: International Conference on Passive and Active Network Measurement (PAM) (2011)","DOI":"10.1007\/978-3-642-19260-9_14"},{"key":"22_CR55","unstructured":"Zhong, R., Mozur, P., Kao, J., Krolik, A.: No \u2018Negative\u2019 news: how China censored the coronavirus (2020). https:\/\/www.nytimes.com\/2020\/12\/19\/technology\/china-coronavirus-censorship.html"},{"issue":"2","key":"22_CR56","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIC.2003.1189191","volume":"7","author":"J Zittrain","year":"2003","unstructured":"Zittrain, J., Edelman, B.: Internet filtering in China. IEEE Internet Comput. 7(2), 70\u201377 (2003)","journal-title":"IEEE Internet Comput."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T13:00:03Z","timestamp":1673614803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}