Fig. 10From: Tor network anonymity evaluation based on node anonymityComparison of node anonymity of RA2 before and after the introduction of malicious program modificationsBack to article page