CONTROLLED VOCABULARY · TECHNIQUES
By techniques
Sorted by paper count.
- dpi Deep Packet Inspection 247 papers
- ip-blocking IP-list blocking 72 papers
- dns-poisoning DNS injection / poisoning 57 papers
- measurement-platform Censorship measurement platform 51 papers
- keyword-filtering Keyword filtering 41 papers
- traffic-shape Traffic-shape / statistical fingerprinting 39 papers
- active-probing Active probing 29 papers
- sni-blocking SNI-based blocking 20 papers
- ml-classifier ML / statistical classifier 18 papers
- rst-injection TCP RST injection 18 papers
- tls-fingerprint TLS ClientHello fingerprinting 16 papers
- esni-eh-blocking Encrypted ClientHello / ESNI blocking 10 papers
- fully-encrypted-detect Fully-encrypted protocol detection 9 papers
- middlebox-interference Middlebox / TCP normalization 8 papers
- asn-blackholing ASN / prefix blackholing 7 papers
- http3-quic-block QUIC / HTTP/3 blocking 7 papers
- packet-injection Packet injection (general) 7 papers
- flow-correlation Flow-correlation traffic analysis 6 papers
- throttling Throttling / bandwidth shaping 5 papers
- bgp-hijack BGP / route manipulation 4 papers
- port-blocking Port-based blocking 3 papers
- random-payload-detect Random / high-entropy payload detection 3 papers
- website-fingerprint Website fingerprinting 0 papers