{"id":"https://openalex.org/W2475740123","doi":"https://doi.org/10.1109/cycon.2016.7529439","title":"Anonymity networks and access to information during conflicts: Towards a distributed network organisation","display_name":"Anonymity networks and access to information during conflicts: Towards a distributed network organisation","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2475740123","doi":"https://doi.org/10.1109/cycon.2016.7529439","mag":"2475740123"},"language":"en","primary_location":{"id":"doi:10.1109/cycon.2016.7529439","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529439","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://eprints.bournemouth.ac.uk/24444/1/Palmieri_CyCon2016.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041742418","display_name":"Paolo Palmieri","orcid":"https://orcid.org/0000-0002-9819-4880"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Paolo Palmieri","raw_affiliation_strings":["Department of Computing and Informatics, Bournemouth University, Poole, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Informatics, Bournemouth University, Poole, United Kingdom","institution_ids":["https://openalex.org/I9300472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5041742418"],"corresponding_institution_ids":["https://openalex.org/I9300472"],"apc_list":null,"apc_paid":null,"fwci":0.4434,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.78896857,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"263","last_page":"275"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.6989450454711914},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6852420568466187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6671745777130127},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6313246488571167},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5577130913734436},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.5342451930046082},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46286070346832275},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.45442676544189453},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.4315556585788727},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.42255163192749023},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2257111668586731},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14246496558189392}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.6989450454711914},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6852420568466187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6671745777130127},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6313246488571167},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5577130913734436},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.5342451930046082},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46286070346832275},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.45442676544189453},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.4315556585788727},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.42255163192749023},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2257111668586731},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14246496558189392},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/cycon.2016.7529439","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529439","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},{"id":"pmh:oai:cora.ucc.ie:10468/4759","is_oa":false,"landing_page_url":"http://hdl.handle.net/10468/4759","pdf_url":null,"source":{"id":"https://openalex.org/S4306400766","display_name":"Cork Open Research Archive (University College Cork)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I27577105","host_organization_name":"University College Cork","host_organization_lineage":["https://openalex.org/I27577105"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:eprints.bournemouth.ac.uk:24444","is_oa":true,"landing_page_url":null,"pdf_url":"http://eprints.bournemouth.ac.uk/24444/1/Palmieri_CyCon2016.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":{"id":"pmh:oai:eprints.bournemouth.ac.uk:24444","is_oa":true,"landing_page_url":null,"pdf_url":"http://eprints.bournemouth.ac.uk/24444/1/Palmieri_CyCon2016.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7699999809265137,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2475740123.pdf","grobid_xml":"https://content.openalex.org/works/W2475740123.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W85823992","https://openalex.org/W1501062233","https://openalex.org/W1505755285","https://openalex.org/W1520914943","https://openalex.org/W1545050218","https://openalex.org/W1601773605","https://openalex.org/W1655958391","https://openalex.org/W1969314716","https://openalex.org/W1998419734","https://openalex.org/W2014682428","https://openalex.org/W2052518690","https://openalex.org/W2078813897","https://openalex.org/W2081307968","https://openalex.org/W2110526464","https://openalex.org/W2111727096","https://openalex.org/W2120869000","https://openalex.org/W2122281733","https://openalex.org/W2123735079","https://openalex.org/W2123845384","https://openalex.org/W2139506608","https://openalex.org/W2139683191","https://openalex.org/W2156410527","https://openalex.org/W2161829417","https://openalex.org/W2168452204","https://openalex.org/W2475719123","https://openalex.org/W2543340598","https://openalex.org/W6629898856","https://openalex.org/W6637080381","https://openalex.org/W6676931134","https://openalex.org/W6680758468"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W1568520348","https://openalex.org/W3214407891","https://openalex.org/W3167675181","https://openalex.org/W3194113117","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W2377660959"],"abstract_inverted_index":{"Access":[0],"to":[1,63,69,89,96,103,117,142,152,170,201,212,224,248],"information":[2,26,140,247],"is":[3,277,294],"crucial":[4],"during":[5,137],"conflicts":[6],"and":[7,43,70,99,105,120,126,149,156,206,254,264],"other":[8],"critical":[9],"events":[10],"such":[11,83,164],"as":[12,84,165,176],"population":[13],"uprisings.":[14],"An":[15],"increasing":[16],"number":[17,77,209],"of":[18,56,78,162,173,197,203,210,215,268,298],"social":[19],"interactions":[20],"happen":[21],"in":[22,108,114,124,128,186,234,251,271],"the":[23,29,54,57,160,179,194,213,216,259,266,283,288,296],"cyberspace,":[24],"while":[25],"exchanges":[27,141],"at":[28,182,220,295],"infrastructural":[30],"level":[31],"(monitoring":[32],"systems,":[33],"sensor":[34],"networks,":[35],"etc.)":[36],"are":[37],"now":[38],"also":[39],"based":[40],"on":[41],"Internet":[42,58,73,121],"wireless":[44],"links":[45],"rather":[46],"than":[47],"ad":[48],"hoc,":[49],"isolated":[50],"wired":[51],"networks.":[52],"However,":[53,159],"nature":[55],"allows":[59,265],"powerful":[60],"hostile":[61,232,272],"actors":[62],"block,":[64],"censor,":[65],"or":[66],"redirect":[67],"communication":[68,101,135],"from":[71,145],"specific":[72],"services,":[74,263],"through":[75],"a":[76,87,208,225,231,235,252],"available":[79],"techniques.":[80],"Anonymity":[81,130],"networks":[82,131,163,270],"Tor":[85,166,183,198,217],"provide":[86,133],"way":[88],"circumvent":[90],"traditional":[91],"strategies":[92],"for":[93,261],"restricting":[94],"access":[95],"online":[97],"resources,":[98],"make":[100],"harder":[102],"trace":[104],"identify.":[106],"Tor,":[107],"particular,":[109,239],"has":[110],"been":[111],"successfully":[112],"used":[113],"past":[115],"crises":[116],"evade":[118],"censorship":[119],"blockades":[122],"(Egypt":[123],"2011,":[125],"Iran":[127],"2012).":[129],"can":[132],"essential":[134],"tools":[136],"conflicts,":[138],"allowing":[139],"be":[143,249],"concealed":[144],"external":[146],"observers,":[147],"anonymised,":[148],"made":[150],"resilient":[151],"imposed":[153],"traffic":[154],"controls":[155],"geographical":[157],"restrictions.":[158],"design":[161],"makes":[167],"them":[168],"vulnerable":[169],"large-scale":[171],"denial":[172,202],"service":[174,204],"attacks,":[175,205],"shown":[177],"by":[178,230],"DDoS":[180],"targeted":[181],"hidden":[184],"services":[185],"March":[187],"2015.":[188],"In":[189,238],"this":[190],"paper,":[191],"we":[192,240],"analyse":[193],"structural":[195],"weaknesses":[196],"with":[199],"regard":[200],"propose":[207],"modifications":[211],"structure":[214],"network":[218,284],"aimed":[219],"improving":[221],"its":[222],"resilience":[223],"large":[226],"coordinated":[227],"offensive":[228],"run":[229],"actor":[233],"conflict":[236],"scenario.":[237],"introduce":[241],"novel":[242],"mechanisms":[243],"that":[244,293],"allow":[245],"relay":[246],"propagated":[250],"distributed":[253],"peer-to-peer":[255],"manner.":[256],"This":[257],"eliminates":[258],"need":[260],"directory":[262],"deployment":[267],"Tor-like":[269],"environments,":[273],"where":[274],"centralised":[275],"control":[276],"impossible.":[278],"The":[279],"proposed":[280],"improvements":[281],"concern":[282],"organisation,":[285],"but":[286],"preserve":[287],"underlying":[289],"onion":[290],"routing":[291],"mechanism":[292],"base":[297],"Tor's":[299],"anonymity.":[300]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
