. Jondonym, Available: http://anonymous-proxy-servers.net

. Proxy-server-usage, Available: http://www.statowl.com/network behind proxy server.php?

D. W. Aha, D. Kibler, and M. K. Albert, Instance-based learning algorithms, Machine Learning, vol.57, issue.1, pp.37-66, 1991.
DOI : 10.1007/BF00153759

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.635

J. Appelbaum and R. Dingledine, How governments have tried to block tor. 28th Chaos Communication Congress (28C3). [Online] Available: http://events.ccc.de/congress, 2011.

A. Back, U. Möller, and A. Stiglic, Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems, Proceedings of the 4th International Workshop on Information Hiding, IHW '01, pp.245-257, 2001.
DOI : 10.1007/3-540-45496-9_18

K. Bauer, D. Mccoy, D. Grunwald, T. Kohno, and D. Sicker, Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007.
DOI : 10.1145/1314333.1314336

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9042

S. Chakravarty, A. Stavrou, and A. D. Keromytis, Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation, Proceedings of the 15th European conference on Research in computer security, ESORICS'10, pp.249-267, 2010.
DOI : 10.1007/978-3-642-15497-3_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.168.4281

Y. Chen, X. Wang, C. Shi, X. Eng-keong-lua, B. Fu et al., Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization, IEEE Transactions on Network and Service Management, vol.8, issue.4, pp.334-347, 2011.
DOI : 10.1109/TNSM.2011.110911.100079

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.2851

M. Thomas, P. E. Cover, and . Hart, Nearest neighbor pattern classification, IEEE Transactions on Information Theory, vol.13, pp.21-27, 1967.

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, Vivaldi: A decentralized network coordinate system, SIGCOMM, pp.15-26, 2004.

C. Diaz, S. Seys, J. Claessens, and B. Preneel, Towards Measuring Anonymity, Proceedings of Privacy Enhancing Technologies Workshop, 2002.
DOI : 10.1007/3-540-36467-6_5

R. Dingledine, N. Mathewson, and P. Syverson, Tor: the second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, pp.21-21, 2004.

N. Hopper, E. Y. Vasserman, and E. Chan-tin, How much anonymity does network latency leak?, ACM Trans. Inf. Syst. Secur, vol.13, pp.13-14, 2010.
DOI : 10.1145/1315245.1315257

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1587

B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright, Timing attacks in low-latency mix-based systems, Proceedings of Financial Cryptography, pp.251-265, 2004.
DOI : 10.1007/978-3-540-27809-2_25

J. Steven, G. Murdoch, and . Danezis, Low-cost traffic analysis of tor, Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.183-195, 2005.

J. Steven, P. Murdoch, and . Zieli´nskizieli´nski, Sampled traffic analysis by internetexchange-level adversaries, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies, 2007.

T. S. , E. Ng, and H. Zhang, Towards global network positioning, Proceedings of the First ACM SIGCOMM Workshop on Internet Measurement, pp.25-29, 2001.
DOI : 10.1145/505203.505206

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.7429

G. Michael, P. F. Reed, D. M. Syverson, and . Goldschlag, Anonymous connections and onion routing. Selected Areas in Communications, IEEE Journal on, vol.16, issue.4, pp.482-494, 1998.

T. Ries, A. Panchenko, R. State, and T. Engel, Comparison of low-latency anonymous communication systems -practical usage and performance, Proceedings of the Australasian International Security Conference, 2011.

H. Zheng, M. Eng-keong-lua, T. G. Pias, and . Griffin, Internet Routing Policies and Round-Trip-Times, PAM, 2005.
DOI : 10.1007/978-3-540-31966-5_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.98.8551

Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, On Flow Correlation Attacks and Countermeasures in Mix Networks, Proceedings of Privacy Enhancing Technologies workshop, pp.207-225, 2004.
DOI : 10.1007/11423409_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.4164