{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:53Z","timestamp":1759133393972,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030521899"},{"type":"electronic","value":"9783030521905"}],"license":[{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T00:00:00Z","timestamp":1597708800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-52190-5_31","type":"book-chapter","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:06:33Z","timestamp":1597680393000},"page":"432-444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fuzzy Graph Modelling of Anonymous Networks"],"prefix":"10.1007","author":[{"given":"Vasisht","family":"Duddu","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[]},{"given":"D. Vijay","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,18]]},"reference":[{"unstructured":"Arne Babenhauserheide. \nhttp:\/\/www.draketo.de\/english\/Freenet\/social-graph-snapshot","key":"31_CR1"},{"unstructured":"Automating OSINT. \nhttp:\/\/www.automatingosint.com\/blog\/","key":"31_CR2"},{"unstructured":"GNUnet. \nhttps:\/\/gnunet.org\/","key":"31_CR3"},{"unstructured":"I2P. \nhttps:\/\/geti2p.net\/","key":"31_CR4"},{"unstructured":"Mascherari Press. \nhttps:\/\/mascherari.press\/","key":"31_CR5"},{"unstructured":"Tor hidden services. \nhttps:\/\/www.torproject.org\/docs\/onion-services.html.en","key":"31_CR6"},{"unstructured":"TOR project. \nhttps:\/\/www.torproject.org\/index.html.en","key":"31_CR7"},{"doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I., Weinmann, R.P.: Trawling for tor hidden services: detection, measurement, deanonymization. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 80\u201394. IEEE Computer Society, Washington (2013). \nhttp:\/\/dx.doi.org\/10.1109\/SP.2013.15","key":"31_CR8","DOI":"10.1109\/SP.2013.15"},{"doi-asserted-by":"crossref","unstructured":"Blue, M., Bush, B., Puckett, J.: Unified approach fuzzy graph problems. Fuzzy Sets Syst. 125(3), 355\u2013368 (2002). \nhttp:\/\/dx.doi.org\/10.1016\/S0165-0114(01)00011-2","key":"31_CR9","DOI":"10.1016\/S0165-0114(01)00011-2"},{"unstructured":"Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 92\u2013102. ACM, New York (2007). \nhttp:\/\/doi.acm.org\/10.1145\/1315245.1315258","key":"31_CR10"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201390 (1981). \nhttp:\/\/doi.acm.org\/10.1145\/358549.358563","key":"31_CR11","DOI":"10.1145\/358549.358563"},{"doi-asserted-by":"crossref","unstructured":"Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System, pp. 46\u201366. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-44702-4_4","key":"31_CR12","DOI":"10.1007\/3-540-44702-4_4"},{"unstructured":"Correa, D., Silva, L.A., Mondal, M., Benevenuto, F., Gummadi, K.P.: The many shades of anonymity: characterizing anonymous social media content. In: Cha, M., Mascolo, C., Sandvig, C. (eds.) ICWSM, pp. 71\u201380. AAAI Press (2015). \nhttp:\/\/dblp.uni-trier.de\/db\/conf\/icwsm\/icwsm2015.html#CorreaSMBG15","key":"31_CR13"},{"unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, vol. 13, pp. 21\u201321. USENIX Association, Berkeley (2004). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1251375.1251396","key":"31_CR14"},{"doi-asserted-by":"crossref","unstructured":"Dyer, K.P., Coull, S.E., Ristenpart, T., Shrimpton, T.: Peek-a-boo, i still see you: why efficient traffic analysis countermeasures fail. In: 2012 IEEE Symposium on Security and Privacy, pp. 332\u2013346, May 2012","key":"31_CR15","DOI":"10.1109\/SP.2012.28"},{"unstructured":"Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, USA (2014)","key":"31_CR16"},{"unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 2013, pp. 337\u2013348. ACM, New York (2013). \nhttp:\/\/doi.acm.org\/10.1145\/2508859.2516651","key":"31_CR17"},{"unstructured":"Leskovec, J., Krevl, A.: SNAP Datasets: stanford large network dataset collection, June 2014. \nhttp:\/\/snap.stanford.edu\/data","key":"31_CR18"},{"unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, pp. 29\u201342. ACM, New York (2007). \nhttp:\/\/doi.acm.org\/10.1145\/1298306.1298311","key":"31_CR19"},{"unstructured":"Mittal, P., Khurshid, A., Juen, J., Caesar, M., Borisov, N.: Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. CoRR abs\/1109.0597 (2011). \nhttp:\/\/arxiv.org\/abs\/1109.0597","key":"31_CR20"},{"doi-asserted-by":"crossref","unstructured":"Mordeson, J.N., Nair, P.S.: Fuzzy graphs and hypergraphs. In: Studies in Fuzziness and Soft Computing. Physica-Verlag, Heidelberg (2000)","key":"31_CR21","DOI":"10.1007\/978-3-7908-1854-3"},{"key":"31_CR22","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"MEJ Newman","year":"2003","unstructured":"Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45, 167 (2003)","journal-title":"SIAM Rev."},{"unstructured":"Overdorf, R., Juarez, M., Acar, G., Greenstadt, R., Diaz, C.: How unique is your .onion?: an analysis of the fingerprintability of tor onion services. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 2021\u20132036. ACM, New York (2017). \nhttp:\/\/doi.acm.org\/10.1145\/3133956.3134005","key":"31_CR23"},{"unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2001, pp. 161\u2013172. ACM, New York (2001). \nhttp:\/\/doi.acm.org\/10.1145\/383059.383072","key":"31_CR24"},{"unstructured":"Rosenfeld, A.: Fuzzy graphs. In: Zadeh, L.A., Fu, K.S., Tanaka, K., Shimura, M. (eds.) Fuzzy Sets and their Applications to Cognitive and Decision Processes, pp. 77 \u2013 95. Academic Press (1975). \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780127752600500086","key":"31_CR25"},{"issue":"12","key":"31_CR26","doi-asserted-by":"publisher","first-page":"2142","DOI":"10.1109\/JPROC.2006.889687","volume":"94","author":"K Sampigethaya","year":"2006","unstructured":"Sampigethaya, K., Poovendran, R.: A survey on mix networks and their secure applications. Proc. IEEE 94(12), 2142\u20132181 (2006)","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., Balzarotti, D., Santos, I.: The onions have eyes: a comprehensive structure and privacy analysis of tor hidden services. In: Proceedings of the 26th International Conference on World Wide Web, WWW 2017, pp. 1251\u20131260. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2017). \nhttps:\/\/doi.org\/10.1145\/3038912.3052657","key":"31_CR27","DOI":"10.1145\/3038912.3052657"},{"unstructured":"Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M., Mittal, P.: RAPTOR: routing attacks on privacy in TOR. CoRR abs\/1503.03940 (2015). \nhttp:\/\/arxiv.org\/abs\/1503.03940","key":"31_CR28"},{"key":"31_CR29","first-page":"92","volume":"4","author":"MS Sunitha","year":"2013","unstructured":"Sunitha, M.S., Mathew, S.: Fuzzy graph theory, a survey. Ann. Pure Appl. Math. 4, 92\u2013110 (2013)","journal-title":"Ann. Pure Appl. Math."},{"doi-asserted-by":"crossref","unstructured":"Tang, J., Zhang, J., Yao, L., Li, J., Zhang, L., Su, Z.: ArnetMiner: extraction and mining of academic social networks. In: KDD 2008, pp. 990\u2013998 (2008)","key":"31_CR30","DOI":"10.1145\/1401890.1402008"},{"unstructured":"Verble, J.: The NSA and Edward Snowden: surveillance in the 21st century. SIGCAS Comput. Soc. 44(3), 14\u201320 (2014). \nhttp:\/\/doi.acm.org\/10.1145\/2684097.2684101","key":"31_CR31"},{"unstructured":"Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H., Zhao, B.Y.: Whispers in the dark: analysis of an anonymous social network. In: Proceedings of the 2014 Conference on Internet Measurement Conference, IMC 2014, pp. 137\u2013150. ACM, New York (2014). \nhttp:\/\/doi.acm.org\/10.1145\/2663716.2663728","key":"31_CR32"},{"issue":"1","key":"31_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MCAS.2003.1228503","volume":"3","author":"XF Wang","year":"2003","unstructured":"Wang, X.F., Chen, G.: Complex networks: small-world, scale-free and beyond. IEEE Circuits Syst. Mag. 3(1), 6\u201320 (2003)","journal-title":"IEEE Circuits Syst. Mag."},{"unstructured":"Yeh, R.T., Bang, S.: Fuzzy relations, fuzzy graphs, and their applications to clustering analysis. In: Zadeh, L.A., Fu, K.S., Tanaka, K., Shimura, M. (eds.) Fuzzy Sets and their Applications to Cognitive and Decision Processes, pp. 125 \u2013 149. Academic Press (1975). \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/B9780127752600500104","key":"31_CR34"},{"unstructured":"Zadeh, L.: Fuzzy sets. Inf. Control 8(3), 338\u2013353 (1965). \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S001999586590241X","key":"31_CR35"},{"doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Fuzzy logic. Computer 21(4), 83\u201393 (1988). \nhttp:\/\/dx.doi.org\/10.1109\/2.53","key":"31_CR36","DOI":"10.1109\/2.53"},{"doi-asserted-by":"crossref","unstructured":"Zadeh, L.A.: Is there a need for fuzzy logic? Inf. Sci. 178(13), 2751\u20132779 (2008). \nhttps:\/\/doi.org\/10.1016\/j.ins.2008.02.012","key":"31_CR37","DOI":"10.1016\/j.ins.2008.02.012"}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52190-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:27:47Z","timestamp":1597681667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52190-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,18]]},"ISBN":["9783030521899","9783030521905"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52190-5_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,18]]},"assertion":[{"value":"18 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop Soft Computing Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/sofa2018.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}