Juen,J., Johnson,A., Das,X., Borisov,N., & XXXXXX,X. (2015). Defending TOR XXXX network XXXXXXXXXXX: X case study XX XXXXXXX XXXX XXXXXXXXXX. XXXXXXXXXXX XX Privacy Enhancing Technologies, 2015(X), XXX-187. XXXXX://XXX.XXX/XX.1515/XXXXXX-2015-XXXX
Mittal,P., XXXXXXXX,A., Juen,X., XXXXXX,M., & XXXXXXX,N. (2011). Stealthy traffic XXXXXXXX XX XXX-latency Anonymous communication using XXXXXXXXXX XXXXXXXXXXXXXX. Proceedings XX XXX XXXX XXX XXXXXXXXXX XX XXXXXXXX and XXXXXXXXXXXXXX XXXXXXXX - XXX 'XX. https://XXX.XXX/10.1145/XXXXXXX.2046732
Week XXX XXXXXXX, XXXXXX four-XXXXXX XXXXX, "The XXXXX Router (TOR)"