{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T06:44:09Z","timestamp":1776753849667,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:00:00Z","timestamp":1562112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,3]]},"DOI":"10.1145\/3314344.3332502","type":"proceedings-article","created":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T12:34:36Z","timestamp":1564058076000},"page":"184-194","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Borders and gateways"],"prefix":"10.1145","author":[{"given":"Kirtus G.","family":"Leyba","sequence":"first","affiliation":[{"name":"Arizona State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benjamin","family":"Edwards","sequence":"additional","affiliation":[{"name":"Cyentia Institute"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cynthia","family":"Freeman","sequence":"additional","affiliation":[{"name":"University of New Mexico"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jedidiah R.","family":"Crandall","sequence":"additional","affiliation":[{"name":"University of New Mexico"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[{"name":"Arizona State University"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Caida as relationships &lt;date range: 01-2009 to 01-2018&gt;. http:\/\/data.caida.org\/datasets\/as-relationships\/.  Caida as relationships &lt;date range: 01-2009 to 01-2018&gt;. http:\/\/data.caida.org\/datasets\/as-relationships\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Freedom on the net 2017. https:\/\/freedomhouse.org\/sites\/default\/files\/FOTN_2017_Final.pdf.  Freedom on the net 2017. https:\/\/freedomhouse.org\/sites\/default\/files\/FOTN_2017_Final.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"International telecommunication union internet statistics. https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx.  International telecommunication union internet statistics. https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx."},{"key":"e_1_3_2_1_4_1","unstructured":"Ip-asn mapping tool from team cymru. https:\/\/www.team-cymru.com\/IP-ASN-mapping.html.  Ip-asn mapping tool from team cymru. https:\/\/www.team-cymru.com\/IP-ASN-mapping.html."},{"key":"e_1_3_2_1_5_1","unstructured":"University of oregon route views project.  University of oregon route views project."},{"key":"e_1_3_2_1_6_1","unstructured":"Brazil looks to break from us-centric internet. 2013.  Brazil looks to break from us-centric internet. 2013."},{"key":"e_1_3_2_1_7_1","unstructured":"Russia considers 'unplugging' from internet. 2019.  Russia considers 'unplugging' from internet. 2019."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.78"},{"key":"e_1_3_2_1_9_1","volume-title":"The hidden internet of iran: Private address allocations on a national network. CoRR, abs\/1209.6398","author":"Anderson Collin","year":"2012","unstructured":"Collin Anderson . The hidden internet of iran: Private address allocations on a national network. CoRR, abs\/1209.6398 , 2012 . Collin Anderson. The hidden internet of iran: Private address allocations on a national network. CoRR, abs\/1209.6398, 2012."},{"key":"e_1_3_2_1_10_1","volume-title":"Dimming the internet: Detecting throttling as a mechanism of censorship in iran. CoRR, abs\/1306.4361","author":"Anderson Collin","year":"2013","unstructured":"Collin Anderson . Dimming the internet: Detecting throttling as a mechanism of censorship in iran. CoRR, abs\/1306.4361 , 2013 . Collin Anderson. Dimming the internet: Detecting throttling as a mechanism of censorship in iran. CoRR, abs\/1306.4361, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"FOCI","author":"Aryan Simurgh","year":"2013","unstructured":"Simurgh Aryan , Homa Aryan , and J Alex Halderman . Internet censorship in iran: A first look . In FOCI , 2013 . Simurgh Aryan, Homa Aryan, and J Alex Halderman. Internet censorship in iran: A first look. In FOCI, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.236"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068818"},{"key":"e_1_3_2_1_15_1","volume-title":"Characterizing and avoiding routing detours through surveillance states. arXiv preprint arXiv:1605.07685","author":"Edmundson Anne","year":"2016","unstructured":"Anne Edmundson , Roya Ensafi , Nick Feamster , and Jennifer Rexford . Characterizing and avoiding routing detours through surveillance states. arXiv preprint arXiv:1605.07685 , 2016 . Anne Edmundson, Roya Ensafi, Nick Feamster, and Jennifer Rexford. Characterizing and avoiding routing detours through surveillance states. arXiv preprint arXiv:1605.07685, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3211887"},{"key":"e_1_3_2_1_17_1","volume-title":"Eu to block david cameron's plans on internet porn crackdown","author":"Eleftheriou-Smith Loulla-Mae","year":"2015","unstructured":"Loulla-Mae Eleftheriou-Smith . Eu to block david cameron's plans on internet porn crackdown . 2015 . Loulla-Mae Eleftheriou-Smith. Eu to block david cameron's plans on internet porn crackdown. 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"FOCI","author":"Filasto Arturo","year":"2012","unstructured":"Arturo Filasto and Jacob Appelbaum . Ooni : Open observatory of network interference . In FOCI , 2012 . Arturo Filasto and Jacob Appelbaum. Ooni: Open observatory of network interference. In FOCI, 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096155"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567561.2567566"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134608"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23311"},{"key":"e_1_3_2_1_24_1","volume-title":"BGP4: Inter-Domain Routing in the Internet","author":"John W.","year":"1999","unstructured":"John W. Stewart III. BGP4: Inter-Domain Routing in the Internet . Addison-Wesley , 1999 . John W. Stewart III. BGP4: Inter-Domain Routing in the Internet. Addison-Wesley, 1999."},{"key":"e_1_3_2_1_25_1","volume-title":"No internet hegemony: Xi","author":"Jie Jiang","year":"2015","unstructured":"Jiang Jie . No internet hegemony: Xi . 2015 . Jiang Jie. No internet hegemony: Xi. 2015."},{"key":"e_1_3_2_1_26_1","volume-title":"Nation-state routing: Censorship, wiretapping, and BGP. CoRR, abs\/0903.3218","author":"Karlin Josh","year":"2009","unstructured":"Josh Karlin , Stephanie Forrest , and Jennifer Rexford . Nation-state routing: Censorship, wiretapping, and BGP. CoRR, abs\/0903.3218 , 2009 . Josh Karlin, Stephanie Forrest, and Jennifer Rexford. Nation-state routing: Censorship, wiretapping, and BGP. CoRR, abs\/0903.3218, 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663750"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656880"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504735"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"e_1_3_2_1_32_1","unstructured":"Bill Marczak Jakub Dalek Sarah McKune Adam Senft John Scott-Railton and Ron Deibert. Bad traffic: Sandvine's PacketLogic devices used to deploy government spyware in Turkey and redirect Egyptian users to affiliate ads? Citizen Lab Report available at https:\/\/citizenlab.ca\/2018\/03\/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria\/.  Bill Marczak Jakub Dalek Sarah McKune Adam Senft John Scott-Railton and Ron Deibert. Bad traffic: Sandvine's PacketLogic devices used to deploy government spyware in Turkey and redirect Egyptian users to affiliate ads? Citizen Lab Report available at https:\/\/citizenlab.ca\/2018\/03\/bad-traffic-sandvines-packetlogic-devices-deploy-government-spyware-turkey-syria\/."},{"key":"e_1_3_2_1_33_1","volume-title":"5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15)","author":"Marczak Bill","year":"2015","unstructured":"Bill Marczak , Nicholas Weaver , Jakub Dalek , Roya Ensafi , David Fi-field, Sarah McKune , Arn Rey , John Scott-Railton , Ron Deibert , and Vern Paxson . An analysis of china's \"great cannon \". In 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15) , Washington, D.C. , 2015 . USENIX Association. Bill Marczak, Nicholas Weaver, Jakub Dalek, Roya Ensafi, David Fi-field, Sarah McKune, Arn Rey, John Scott-Railton, Ron Deibert, and Vern Paxson. An analysis of china's \"great cannon\". In 5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), Washington, D.C., 2015. USENIX Association."},{"key":"e_1_3_2_1_34_1","volume-title":"Nine out of ten homes to have porn filters within two months","author":"Prynne Miranda","year":"2013","unstructured":"Miranda Prynne . Nine out of ten homes to have porn filters within two months . 2013 . Miranda Prynne. Nine out of ten homes to have porn filters within two months. 2013."},{"key":"e_1_3_2_1_35_1","volume-title":"How the digital economy act will come between you and porn","author":"Rigg Jamie","year":"2017","unstructured":"Jamie Rigg . How the digital economy act will come between you and porn . 2017 . Jamie Rigg. How the digital economy act will come between you and porn. 2017."},{"key":"e_1_3_2_1_36_1","volume-title":"6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16)","author":"Singh Rachee","year":"2016","unstructured":"Rachee Singh , Hyungjoon Koo , Najmehalsadat Miramirkhani , Fahimeh Mirhaj , Phillipa Gill , and Leman Akoglu . The politics of routing: Investigating the relationship between AS connectivity and internet freedom . In 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16) , Austin, TX , 2016 . USENIX Association. Rachee Singh, Hyungjoon Koo, Najmehalsadat Miramirkhani, Fahimeh Mirhaj, Phillipa Gill, and Leman Akoglu. The politics of routing: Investigating the relationship between AS connectivity and internet freedom. In 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 16), Austin, TX, 2016. USENIX Association."},{"key":"e_1_3_2_1_37_1","volume-title":"The growth of global internet censorship and circumvention: A survey","author":"Subramanian Ramesh","year":"2011","unstructured":"Ramesh Subramanian . The growth of global internet censorship and circumvention: A survey . 2011 . Ramesh Subramanian. The growth of global internet censorship and circumvention: A survey. 2011."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.59"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987510.1987524"},{"key":"e_1_3_2_1_40_1","first-page":"227","volume-title":"Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13)","author":"Zhu Tao","year":"2013","unstructured":"Tao Zhu , David Phipps , Adam Pridgen , Jedidiah R Crandall , and Dan S Wallach . The velocity of censorship: High-fidelity detection of microblog post deletions . In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13) , pages 227 -- 240 , 2013 . Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R Crandall, and Dan S Wallach. The velocity of censorship: High-fidelity detection of microblog post deletions. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), pages 227--240, 2013."}],"event":{"name":"COMPASS '19: ACM SIGCAS Conference on Computing and Sustainable Societies","location":"Accra Ghana","acronym":"COMPASS '19","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314344.3332502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314344.3332502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:29Z","timestamp":1750204409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314344.3332502"}},"subtitle":["measuring and analyzing national as chokepoints"],"short-title":[],"issued":{"date-parts":[[2019,7,3]]},"references-count":40,"alternative-id":["10.1145\/3314344.3332502","10.1145\/3314344"],"URL":"https:\/\/doi.org\/10.1145\/3314344.3332502","relation":{},"subject":[],"published":{"date-parts":[[2019,7,3]]},"assertion":[{"value":"2019-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}