Fig. 3From: Tor network anonymity evaluation based on node anonymityNode anonymity evaluationBack to article page