Fig. 9From: Tor network anonymity evaluation based on node anonymityComparison of network anonymity before and after removeing anomalous nodesBack to article page