Fig. 6From: Tor network anonymity evaluation based on node anonymityComparison of three network anonymity evaluation methodsBack to article page