IIIT-Delhi Institutional Repository
Search
Login
Home
→
Search
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search
Search:
All of DSpace
Computational Biology
Computer Science and Engineering
Electronics and Communication Engineering
Human Centered Design
Mathematics
Social Sciences and Humanities
Filters
Use filters to refine the search results.
Current Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
New Filters:
Title
Author
Subject
Date issued
Contains
Equals
ID
Not Contains
Not Equals
Not ID
Showing 4 out of a total of 4 results.
(0.231 seconds)
Now showing items 1-4 of 4
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Qi points : placing decoy routers in the internet
Gosain, Devashish
;
Agarwal, Anshika
;
Acharya, Hrishikesh Bhatt
;
Chakravarty, Sambuddho
(
2016-09-23
)
Maginot lines and tourniquets : on the defendability of national cyberspace
Gosain, Devashish
;
Rawat, Madhur
;
Sharma, Piyush Kumar
;
Acharya, Hrishikesh Bhatt
(
IIIT-Delhi
,
2020-01
)
Cairn : identifying network locations for large scale censorship by resource-constrained adversaries
Agarwal, Anshika
;
Gosain, Devashish
;
Acharya, Hrishikesh Bhatt
;
Chakravarty, Sambuddho
(
2016-09-23
)
A quest for cyber high ground : impact of internet structure on (anti-) censorship
Gosain, Devashish
;
Chakravarty, Sambuddho (Advisor)
(
IIIT-Delhi
,
2020-07
)
Now showing items 1-4 of 4
1
Sort Options:
Relevance
Title Asc
Title Desc
Issue Date Asc
Issue Date Desc
Results Per Page:
5
10
20
40
60
80
100
Browse
All of Repository
Communities & Collections
By Issue Date
Authors
Titles
Subjects
My Account
Login
Register
Discover
Author
Gosain, Devashish (4)
Acharya, Hrishikesh Bhatt (3)
Agarwal, Anshika (2)
Chakravarty, Sambuddho (2)
Chakravarty, Sambuddho (Advisor) (1)
Rawat, Madhur (1)
Sharma, Piyush Kumar (1)
Subject
Censorship (1)
Constraint Based Geolocation (CBG), Content Distribution Network (CDNs), Autonomous Systems (ASes), Censorships and Internet Structure (1)
Cyber defense (1)
Cyber high ground (1)
Decoy Routers (1)
Internet Maps (1)
Qi Points (1)
Resource-Constrained Adversaries (1)
... View More
Date Issued
2020 (2)
2016 (2)