An Approach to the Workload Characterization Problem, Computer, vol.9, issue.6, pp.18-32, 1976. ,
DOI : 10.1109/C-M.1976.218610
Extracting application objects from TCP packet traces, 2007 Australasian Telecommunication Networks and Applications Conference, pp.151-156, 2007. ,
DOI : 10.1109/ATNAC.2007.4665240
Libtrace, ACM SIGCOMM Computer Communication Review, vol.42, issue.2, pp.42-48, 2012. ,
DOI : 10.1145/2185376.2185382
Generating Representative Web Workloads for Network and Server Performance Evaluation, pp.151-160, 1998. ,
DOI : 10.1145/277851.277897
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.1314
ExperimenTor: A Testbed for Safe Realistic Tor Experimentation, In: Workshop on Cyber Security Experimentation and Test, 2011. ,
Web MIXes: A System for Anonymous and Unobservable Internet Access, pp.115-129 ,
DOI : 10.1007/3-540-44702-4_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.5586
Stochastic Models for Generating Synthetic HTTP Source Traffic, p.INFOCOM, 2004. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
DOI : 10.1145/358549.358563
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Waiting for Anonymity: Understanding Delays in the Tor Overlay. In: Peer-to-Peer Computing, pp.1-4, 2010. ,
Tor: The Second-Generation Onion Router, 13th USENIX Security Symposium, pp.303-320, 2004. ,
Difficulties in simulating the Internet, IEEE/ACM Transactions on Networking, vol.9, issue.4, pp.392-403, 2001. ,
DOI : 10.1109/90.944338
Introducing the gMix Open Source Framework for Mix Implementations, ESORICS 2012, pp.487-504, 2012. ,
DOI : 10.1007/978-3-642-33167-1_28
Tracking the Evolution of Web Traffic, IEEE, pp.1995-2003, 2003. ,
Generating Realistic TCP Workloads, Int. CMG Conference, pp.273-284, 2004. ,
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation, Proceedings of the Network and Distributed System Security Symposium (NDSS'12). Internet Society, 2012. ,
Shining Light in Dark Places: Understanding the Tor Network, Privacy Enhancing Technologies, pp.63-76, 2008. ,
DOI : 10.1007/978-3-540-70630-4_5
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Federrath [12], pp.10-29 ,
DOI : 10.1007/3-540-44702-4_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.1097
Web metrics: Size and number of resources, 2010. ,
Swing: Realistic and Responsive Network Traffic Generation, IEEE/ACM Transactions on Networking, vol.17, issue.3, pp.712-725, 2009. ,
DOI : 10.1109/TNET.2009.2020830
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.3786
An Empirical Evaluation of Relay Selection in Tor, Proceedings of the Network and Distributed System Security Symposium (NDSS'13). Internet Society, 2013. ,
Dependent link padding algorithms for low latency anonymity systems, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.323-332, 2008. ,
DOI : 10.1145/1455770.1455812
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.452.6637
Tmix, ACM SIGCOMM Computer Communication Review, vol.36, issue.3, pp.65-76, 2006. ,
DOI : 10.1145/1140086.1140094
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective, Privacy Enhancing Technologies, pp.233-253, 2007. ,
DOI : 10.1007/978-3-540-75551-7_15