Fig. 4From: Tor network anonymity evaluation based on node anonymityTor network structure diagramBack to article page