A. Agrawala, J. Mohr, and R. Bryant, An Approach to the Workload Characterization Problem, Computer, vol.9, issue.6, pp.18-32, 1976.
DOI : 10.1109/C-M.1976.218610

S. Alcock, D. Lawson, and R. Nelson, Extracting application objects from TCP packet traces, 2007 Australasian Telecommunication Networks and Applications Conference, pp.151-156, 2007.
DOI : 10.1109/ATNAC.2007.4665240

S. Alcock, P. Lorier, and R. Nelson, Libtrace, ACM SIGCOMM Computer Communication Review, vol.42, issue.2, pp.42-48, 2012.
DOI : 10.1145/2185376.2185382

P. Barford and M. Crovella, Generating Representative Web Workloads for Network and Server Performance Evaluation, pp.151-160, 1998.
DOI : 10.1145/277851.277897

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.1314

K. Bauer, M. Sherr, D. Mccoy, and D. Grunwald, ExperimenTor: A Testbed for Safe Realistic Tor Experimentation, In: Workshop on Cyber Security Experimentation and Test, 2011.

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, pp.115-129
DOI : 10.1007/3-540-44702-4_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.5586

J. Cao, W. S. Cleveland, Y. Gao, K. Jeffay, F. D. Smith et al., Stochastic Models for Generating Synthetic HTTP Source Traffic, p.INFOCOM, 2004.

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

P. Dhungel, M. Steiner, I. Rimac, V. Hilt, and K. W. Ross, Waiting for Anonymity: Understanding Delays in the Tor Overlay. In: Peer-to-Peer Computing, pp.1-4, 2010.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, 13th USENIX Security Symposium, pp.303-320, 2004.

S. Floyd and V. Paxson, Difficulties in simulating the Internet, IEEE/ACM Transactions on Networking, vol.9, issue.4, pp.392-403, 2001.
DOI : 10.1109/90.944338

K. P. Fuchs, D. Herrmann, and H. Federrath, Introducing the gMix Open Source Framework for Mix Implementations, ESORICS 2012, pp.487-504, 2012.
DOI : 10.1007/978-3-642-33167-1_28

F. Hernández-campos, K. Jeffay, and F. D. Smith, Tracking the Evolution of Web Traffic, IEEE, pp.1995-2003, 2003.

F. Hernández-campos, F. D. Smith, and K. Jeffay, Generating Realistic TCP Workloads, Int. CMG Conference, pp.273-284, 2004.

R. Jansen and N. Hopper, Shadow: Running Tor in a Box for Accurate and Efficient Experimentation, Proceedings of the Network and Distributed System Security Symposium (NDSS'12). Internet Society, 2012.

D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Privacy Enhancing Technologies, pp.63-76, 2008.
DOI : 10.1007/978-3-540-70630-4_5

J. F. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Federrath [12], pp.10-29
DOI : 10.1007/3-540-44702-4_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.1097

S. Ramachandran, Web metrics: Size and number of resources, 2010.

K. V. Vishwanath and A. Vahdat, Swing: Realistic and Responsive Network Traffic Generation, IEEE/ACM Transactions on Networking, vol.17, issue.3, pp.712-725, 2009.
DOI : 10.1109/TNET.2009.2020830

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.3786

C. Wacek, H. Tan, K. Bauer, and M. Sherr, An Empirical Evaluation of Relay Selection in Tor, Proceedings of the Network and Distributed System Security Symposium (NDSS'13). Internet Society, 2013.

W. Wang, M. Motani, and V. Srinivasan, Dependent link padding algorithms for low latency anonymity systems, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.323-332, 2008.
DOI : 10.1145/1455770.1455812

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.6637

M. C. Weigle, P. Adurthi, F. Hernández-campos, K. Jeffay, and F. D. Smith, Tmix, ACM SIGCOMM Computer Communication Review, vol.36, issue.3, pp.65-76, 2006.
DOI : 10.1145/1140086.1140094

R. Wendolsky, D. Herrmann, and H. Federrath, Performance Comparison of Low-Latency Anonymisation Services from a User Perspective, Privacy Enhancing Technologies, pp.233-253, 2007.
DOI : 10.1007/978-3-540-75551-7_15