{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:44Z","timestamp":1772041604089,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,5]],"date-time":"2014-11-05T00:00:00Z","timestamp":1415145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,5]]},"DOI":"10.1145\/2663716.2663750","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"271-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["A Look at the Consequences of Internet Censorship Through an ISP Lens"],"prefix":"10.1145","author":[{"given":"Sheharbano","family":"Khattak","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Mobin","family":"Javed","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, CA, USA"}]},{"given":"Syed Ali","family":"Khayam","sequence":"additional","affiliation":[{"name":"PLUMgrid, Lahore, Pakistan"}]},{"given":"Zartash Afzal","family":"Uzmi","sequence":"additional","affiliation":[{"name":"LUMS SBASSE, Lahore, Pakistan"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"UC Berkeley, ICSI, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398833"},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. http:\/\/www.alexa.com\/topsites. Online. April 2014.  Alexa. http:\/\/www.alexa.com\/topsites. Online. April 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317307.2317311"},{"key":"e_1_3_2_1_4_1","volume-title":"Free and Open Communications on the Internet","author":"Aryan S.","year":"2013"},{"key":"e_1_3_2_1_5_1","unstructured":"A. Attaa. http:\/\/tinyurl.com\/mnw9olp. Online. Feb 2014.  A. Attaa. http:\/\/tinyurl.com\/mnw9olp. Online. Feb 2014."},{"key":"e_1_3_2_1_6_1","unstructured":"Bro. http:\/\/www.bro.org\/. Online. April 2014.  Bro. http:\/\/www.bro.org\/. Online. April 2014."},{"key":"e_1_3_2_1_7_1","volume-title":"Cornell University Library","author":"Chaabane A.","year":"2014"},{"key":"e_1_3_2_1_8_1","unstructured":"Cisco. http:\/\/tinyurl.com\/mev32z8. Online. Apr 2014.  Cisco. http:\/\/tinyurl.com\/mev32z8. Online. Apr 2014."},{"key":"e_1_3_2_1_9_1","unstructured":"Citizen Lab. O Pakistan We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper's Role in Pakistan's Censorship Regime. http:\/\/tinyurl.com\/oxxap8t June 2013.  Citizen Lab. O Pakistan We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper's Role in Pakistan's Censorship Regime. http:\/\/tinyurl.com\/oxxap8t June 2013."},{"key":"e_1_3_2_1_10_1","unstructured":"M. Cooper. http:\/\/tinyurl.com\/p7ck76f. Online. Feb 2014.  M. Cooper. http:\/\/tinyurl.com\/p7ck76f. Online. Feb 2014."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315290"},{"key":"e_1_3_2_1_12_1","unstructured":"S. Crocker D. Dagon D. Kaminsky D. McPherson and P. Vixie. Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill. http:\/\/domainincite.com\/docs\/PROTECT-IP-Technical-Whitepaper-Final. pdf May 2011.  S. Crocker D. Dagon D. Kaminsky D. McPherson and P. Vixie. Security and Other Technical Concerns Raised by the DNS Filtering Requirements in the PROTECT IP Bill. http:\/\/domainincite.com\/docs\/PROTECT-IP-Technical-Whitepaper-Final. pdf May 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068818"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504763"},{"key":"e_1_3_2_1_15_1","unstructured":"Dawn. http:\/\/tinyurl.com\/n3j22gy. Online. April 2014.  Dawn. http:\/\/tinyurl.com\/n3j22gy. Online. April 2014."},{"key":"e_1_3_2_1_16_1","author":"Dawn","year":"2014","journal-title":"News. http:\/\/tinyurl.com\/m7vhg7u. Online."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. Workshop on Securing and Trusting Internet Names, SATIN","author":"Duan H.","year":"2012"},{"key":"e_1_3_2_1_18_1","unstructured":"Electronic Frontier Foundation (EFF). http:\/\/tinyurl.com\/oklfy29. Online. Apr 2014.  Electronic Frontier Foundation (EFF). http:\/\/tinyurl.com\/oklfy29. Online. Apr 2014."},{"key":"e_1_3_2_1_19_1","unstructured":"ElectronicFrontierFoundation. Switzerland. http:\/\/tinyurl.com\/d22vbbq.  ElectronicFrontierFoundation. Switzerland. http:\/\/tinyurl.com\/d22vbbq."},{"key":"e_1_3_2_1_20_1","volume-title":"Automated Named Entity Extraction for Tracking Censorship of Current Events. In USENIX Workshop on Free and Open Communications on the Internet","author":"Espinoza A. M.","year":"2011"},{"key":"e_1_3_2_1_21_1","unstructured":"ExtremeTech. http:\/\/tinyurl.com\/6nabr85. Online. Apr 2014.  ExtremeTech. http:\/\/tinyurl.com\/6nabr85. Online. Apr 2014."},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"P2P","author":"Farahbakhsh R.","year":"2013"},{"key":"e_1_3_2_1_23_1","volume-title":"Free and Open Communications on the Internet","author":"Filast\u00f2 A.","year":"2012"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298310"},{"key":"e_1_3_2_1_25_1","unstructured":"Internet Service Providers Association of Pakistan (ISPAK). http:\/\/www.ispak.pk. Online. Apr 2014.  Internet Service Providers Association of Pakistan (ISPAK). http:\/\/www.ispak.pk. Online. Apr 2014."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879173"},{"key":"e_1_3_2_1_27_1","volume-title":"Citizen Lab","author":"Lab C.","year":"2012"},{"key":"e_1_3_2_1_28_1","unstructured":"C. Labovitz. The Other 50% of the Internet. North American Network Operators' Group (NANOG) presentation February 2012.  C. Labovitz. The Other 50% of the Internet. North American Network Operators' Group (NANOG) presentation February 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987510.1987514"},{"key":"e_1_3_2_1_30_1","unstructured":"McAfee. http:\/\/www.trustedsource.org. Online. Apr 2014.  McAfee. http:\/\/www.trustedsource.org. Online. Apr 2014."},{"key":"e_1_3_2_1_31_1","unstructured":"Mozilla. https:\/\/wiki.mozilla.org\/Public_Suffix_List. Online. Apr 2014.  Mozilla. https:\/\/wiki.mozilla.org\/Public_Suffix_List. Online. Apr 2014."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. USENIX Workshop on Free and Open Communications on the Internet","author":"Nabi Z.","year":"2013"},{"key":"e_1_3_2_1_33_1","author":"F.","year":"2014","journal-title":"News. http:\/\/tinyurl.com\/22me5e7. Online."},{"key":"e_1_3_2_1_34_1","unstructured":"OpenNet Initiative. Pakistan. Online. April 2014.  OpenNet Initiative. Pakistan. Online. April 2014."},{"key":"e_1_3_2_1_35_1","unstructured":"OpenNet Initiative. https:\/\/opennet.net. Online. Apr 2014.  OpenNet Initiative. https:\/\/opennet.net. Online. Apr 2014."},{"key":"e_1_3_2_1_36_1","volume-title":"Feb, 2014.","author":"Reidy P."},{"key":"e_1_3_2_1_37_1","unstructured":"Renesys. Turkish Internet Censorship Takes a New Turn. http:\/\/www.renesys.com\/2014\/03\/turkish-internet-censorship\/ 2014.  Renesys. Turkish Internet Censorship Takes a New Turn. http:\/\/www.renesys.com\/2014\/03\/turkish-internet-censorship\/ 2014."},{"key":"e_1_3_2_1_38_1","unstructured":"Security Information Exchange. https:\/\/www.dnsdb.info\/. Online. Apr 2014.  Security Information Exchange. https:\/\/www.dnsdb.info\/. Online. Apr 2014."},{"key":"e_1_3_2_1_39_1","volume-title":"CensMon: A Web Censorship Monitor. In USENIX Workshop on Free and Open Communications on the Internet","author":"Sfakianakis A.","year":"2011"},{"key":"e_1_3_2_1_40_1","volume-title":"Apr, 2014."},{"key":"e_1_3_2_1_41_1","volume-title":"Apr, 2014."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504739"},{"key":"e_1_3_2_1_43_1","volume-title":"Free and Open Communications on the Internet","author":"Verkamp J.-P.","year":"2012"},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. NDSS","author":"Weaver N.","year":"2009"},{"key":"e_1_3_2_1_45_1","volume-title":"Online.","author":"Pakistan YouTube","year":"2014"}],"event":{"name":"IMC '14: Internet Measurement Conference","location":"Vancouver BC Canada","acronym":"IMC '14","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2014 Conference on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663716.2663750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:18Z","timestamp":1750229778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663716.2663750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,5]]},"references-count":45,"alternative-id":["10.1145\/2663716.2663750","10.1145\/2663716"],"URL":"https:\/\/doi.org\/10.1145\/2663716.2663750","relation":{},"subject":[],"published":{"date-parts":[[2014,11,5]]},"assertion":[{"value":"2014-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}