R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, 13th USENIX Security Symposium, 2004.

D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, 2008.
DOI : 10.1007/978-3-540-70630-4_5

T. Project, Measuring Tor and Iran, 2009.

. Forbes and . Pluggedin, Web tools help protect human rights activists, 2009.

D. Egerstad, DEranged gives you 100 passwords to Governments & Embassies. online, 2007.

J. F. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Lecture Notes in Computer Science, pp.10-29, 2001.
DOI : 10.1007/3-540-44702-4_2

N. Mathewson and R. Dingledine, Practical Traffic Analysis: Extending and Resisting Statistical Disclosure, Lecture Notes in Computer Science, vol.3424, pp.17-34, 2005.
DOI : 10.1007/11423409_2

N. Hopper, E. Y. Vasserman, and E. Chan-tin, How much anonymity does network latency leak?, Proceedings of the 14th ACM conference on Computer and communications security, p.91, 2007.

J. Steven, G. Murdoch, and . Danezis, Low-Cost Traffic Analysis of Tor, SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.183-195, 2005.

K. Bauer, D. Mccoy, D. Grunwald, T. Kohno, and D. Sicker, Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007.
DOI : 10.1145/1314333.1314336

S. J. Murdoch, Hot or not, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, p.36, 2006.
DOI : 10.1145/1180405.1180410

L. Øverlier and P. Syverson, Locating hidden servers, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006.
DOI : 10.1109/SP.2006.24

M. Barbaro and T. Zeller, A face is exposed for AOL searcher no. 4417749, New York Times, vol.9, 2006.

A. Christensen, Practical Onion Hacking: finding the real address of Tor clients, 2006.

T. G. Abbott, K. J. Lai, M. R. Lieberman, and E. C. Price, Browser-Based Attacks on Tor, Lecture Notes in Computer Science, vol.4776, p.184, 2007.
DOI : 10.1007/978-3-540-75551-7_12

M. Perry, Torflow: Tor network analysis, HotPETs 2009: 9th Privacy Enhancing Technologies Symposium, p.14, 2009.