Fig. 2From: Tor network anonymity evaluation based on node anonymityNode stability intervalBack to article page