Fig. 8From: Tor network anonymity evaluation based on node anonymityComparison of the three network anonymity evaluation methods when relay authority RA1 is subject to a DDoS attackBack to article page