Available: http://anonymous-proxy-servers.net ,
Available: http://www.statowl.com/network behind proxy server.php? ,
Instance-based learning algorithms, Machine Learning, vol.57, issue.1, pp.37-66, 1991. ,
DOI : 10.1007/BF00153759
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.635
How governments have tried to block tor. 28th Chaos Communication Congress (28C3). [Online] Available: http://events.ccc.de/congress, 2011. ,
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems, Proceedings of the 4th International Workshop on Information Hiding, IHW '01, pp.245-257, 2001. ,
DOI : 10.1007/3-540-45496-9_18
Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007. ,
DOI : 10.1145/1314333.1314336
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9042
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation, Proceedings of the 15th European conference on Research in computer security, ESORICS'10, pp.249-267, 2010. ,
DOI : 10.1007/978-3-642-15497-3_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.168.4281
Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization, IEEE Transactions on Network and Service Management, vol.8, issue.4, pp.334-347, 2011. ,
DOI : 10.1109/TNSM.2011.110911.100079
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.2851
Nearest neighbor pattern classification, IEEE Transactions on Information Theory, vol.13, pp.21-27, 1967. ,
Vivaldi: A decentralized network coordinate system, SIGCOMM, pp.15-26, 2004. ,
Towards Measuring Anonymity, Proceedings of Privacy Enhancing Technologies Workshop, 2002. ,
DOI : 10.1007/3-540-36467-6_5
Tor: the second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, pp.21-21, 2004. ,
How much anonymity does network latency leak?, ACM Trans. Inf. Syst. Secur, vol.13, pp.13-14, 2010. ,
DOI : 10.1145/1315245.1315257
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1587
Timing attacks in low-latency mix-based systems, Proceedings of Financial Cryptography, pp.251-265, 2004. ,
DOI : 10.1007/978-3-540-27809-2_25
Low-cost traffic analysis of tor, Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.183-195, 2005. ,
Sampled traffic analysis by internetexchange-level adversaries, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies, 2007. ,
Towards global network positioning, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement, pp.25-29, 2001. ,
DOI : 10.1145/505203.505206
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.7429
Anonymous connections and onion routing. Selected Areas in Communications, IEEE Journal on, vol.16, issue.4, pp.482-494, 1998. ,
Comparison of low-latency anonymous communication systems -practical usage and performance, Proceedings of the Australasian International Security Conference, 2011. ,
Internet Routing Policies and Round-Trip-Times, PAM, 2005. ,
DOI : 10.1007/978-3-540-31966-5_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.8551
On Flow Correlation Attacks and Countermeasures in Mix Networks, Proceedings of Privacy Enhancing Technologies workshop, pp.207-225, 2004. ,
DOI : 10.1007/11423409_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.4164