1 |
P. Sherrell, "International Comparative Legal Guide to: Copyright 2019," Global Legal Group Ltd., London, United Kingdom, 5th Edition, Oct. 2018.
|
2 |
D. Zhang, "Illegal File Sharing & The Film Industry," B.S. thesis, Dept. Economics, California Univ., Berkeley, CA, USA, 2015.
|
3 |
European Union Intellectual Property Office (EUIPO), "Online Copyright Infringement in the European Union: Music, Film and TV (2017-2018), Trends and Drivers," European Union Intellectual Property Office, Alicante, Spain, Nov. 2019.
|
4 |
MPA Asia Pacific, "MPA Study on Site Blocking Impact in South Korea," MPA Asia Pacific, Los Angeles, CA, United States, May 2018.
|
5 |
Creative Content Australia, "Site Blocking Laws in Australia," Creative Content Australia, Sydney, Australia,
|
6 |
Korea Copyright Protection Agency, "2019 annual report on copyright protection," Korea Copyright Protection Agency, Seoul, Korea, Aug. 2019.
|
7 |
High Authority for the dissemination of works and the protection of rights on the internet (Hadopi), "Anti-piracy Strategies Concerning Cultural and Sports Content -2019 International Survey," High Authority for the dissemination of works and the protection of rights on the internet (Hadopi), Paris, France, May 2020.
|
8 |
Ofcom, "Site Blocking" to reduce online copyright infringement," Ofcom, London, United Kingdom, May 2011.
|
9 |
K. E. Noonan, "2019 Review of Notorious Markets for Counterfeiting and Piracy," Office of the United States Trade Representative Executive Office of the President, Washington DC, United States, May 2020.
|
10 |
Incopro, "Site blocking efficacy in Portugal -September 2015 to October 2016," Incopro, London, United Kingdom, Feb. 2020.
|
11 |
Office for Harmonization in the internal market, "Digital advertising on suspected infringing websites," Office for Harmonization in the internal market, Provincia de Alicante, Spain, Jan. 2016.
|
12 |
D. H. Kim, H.S. Jeong, and J. Kwak, "Development of lifecycle model for copyright infringement site," Journal of The Korea Institute of Information Security & Cryptology, vol. 30, No. 1, pp. 101-121, Feb. 2020.
DOI
|
13 |
S. K. Choi and J. Kwak, "Feature analysis and detection techniques for piracy sites," KSII Transactions on Internet and Information Systems, vol. 14, no. 5, pp. 2204-2220, May. 2020.
DOI
|
14 |
S. Oh, S. Wallsten, and N. Lovin, "Do pirated video streams crowd out non-pirated video streams? evidence from online activity," Technology Policy Institute, Washington DC, United States, Jan. 2020.
|
15 |
A. K. Sharma and N. Sharma, "Bit torrent (peer to peer network): Antipiracy and Anonymity," International Journal of Science and Research, vol. 4, no. 7, pp. 253-256, July 2015.
|
16 |
Huawei Cloud, "Domain Name Service," Service Overview, no. 6, Feb. 2020.
|
17 |
E. Paz, "Cyber-Attacks discovery via analysis of DNS," M.S. thesis, Dept. Computer Science Division, The Open Univ., Ranana, Israel, 2020.
|
18 |
K. Reitz, "Requests Documentation," K. Reitz, Release 2.25.0, Nov. 2020.
|
19 |
DELL, "REST API Programmer's Guide," DELL, Version 5.x, Austin, Texas, June 2019.
|
20 |
Cloudflare, "Securing Applications in the Cloud," Cloudflare, Austin, Texas, 2019.
|