{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:06:20Z","timestamp":1775322380807,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2808138.2808152","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"95-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Towards Measuring Resilience in Anonymous Communication Networks"],"prefix":"10.1145","author":[{"given":"Fatemeh","family":"Shirazi","sequence":"first","affiliation":[{"name":"KU Leuven, ESAT\/COSIC and iMinds, Leuven, Belgium"}]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[{"name":"KU Leuven, ESAT\/COSIC and iMinds, Leuven, Belgium"}]},{"given":"Joss","family":"Wright","sequence":"additional","affiliation":[{"name":"Oxford Internet Institute, University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"e_1_3_2_1_2_1","volume-title":"NSA and GCHQ target tor network that protects anonymity of web users","author":"Ball J.","year":"2013","unstructured":"Ball , J. , Schneier , B. , and Greenwald , G . NSA and GCHQ target tor network that protects anonymity of web users , 2013 . Ball, J., Schneier, B., and Greenwald, G. NSA and GCHQ target tor network that protects anonymity of web users, 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_37"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315258"},{"key":"e_1_3_2_1_5_1","volume-title":"WEIS'06 (June","author":"Dingledine R.","year":"2006","unstructured":"Dingledine , R. , and Mathewson , N . Anonymity loves company: Usability and the network effect . In WEIS'06 (June 2006 ), R. Anderson, Ed. Dingledine, R., and Mathewson, N. Anonymity loves company: Usability and the network effect. In WEIS'06 (June 2006), R. Anderson, Ed."},{"key":"e_1_3_2_1_6_1","first-page":"21","volume-title":"SSYM'04","author":"Dingledine R.","unstructured":"Dingledine , R. , Mathewson , N. , and Syverson , P . Tor: the second-generation onion router . SSYM'04 , USENIX, pp. 21 -- 21 . Dingledine, R., Mathewson, N., and Syverson, P. Tor: the second-generation onion router. SSYM'04, USENIX, pp. 21--21."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.11.010"},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium","author":"Evans N. S.","year":"2009","unstructured":"Evans , N. S. , Dingledine , R. , and Grothoff , C . A practical congestion attack on tor using long paths . In USENIX Security Symposium ( Berkeley, CA, USA , 2009 ), SSYM'09, USENIX Association, pp. 33--50. Evans, N. S., Dingledine, R., and Grothoff, C. A practical congestion attack on tor using long paths. In USENIX Security Symposium (Berkeley, CA, USA, 2009), SSYM'09, USENIX Association, pp. 33--50."},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX Workshop, CSET'12 (August","author":"Jansen R.","year":"2012","unstructured":"Jansen , R. , Bauer , K. , Hopper , N. , and Dingledine , R . Methodically modeling the tor network . In USENIX Workshop, CSET'12 (August 2012 ). Jansen, R., Bauer, K., Hopper, N., and Dingledine, R. Methodically modeling the tor network. In USENIX Workshop, CSET'12 (August 2012)."},{"key":"e_1_3_2_1_10_1","volume-title":"NDSS'12 (February","author":"Jansen R.","year":"2012","unstructured":"Jansen , R. , and Hopper , N . Shadow: Running Tor in a Box for Accurate and Efficient Experimentation . In NDSS'12 (February 2012 ), Internet Society. Jansen, R., and Hopper, N. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. In NDSS'12 (February 2012), Internet Society."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23288"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_5"},{"key":"e_1_3_2_1_13_1","volume-title":"NDSS'14 (February","author":"Norcie G.","year":"2014","unstructured":"Norcie , G. , Blythe , J. , Caine , K. , and Camp , L. J . hy Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems . In NDSS'14 (February 2014 ), Internet Society. Norcie, G., Blythe, J., Caine, K., and Camp, L. J. hy Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. In NDSS'14 (February 2014), Internet Society."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665963"},{"key":"e_1_3_2_1_16_1","unstructured":"Tor Project Inc. Tor metrics portal. https:\/\/metrics.torproject.org\/ 2013.  Tor Project Inc. Tor metrics portal. https:\/\/metrics.torproject.org\/ 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Congestion-aware Path Selection for Tor. In FC'12","author":"Wang T.","year":"2012","unstructured":"Wang , T. , Bauer , K. , Forero , C. , and Goldberg , I . Congestion-aware Path Selection for Tor. In FC'12 ( 2012 ). Wang, T., Bauer, K., Forero, C., and Goldberg, I. Congestion-aware Path Selection for Tor. In FC'12 (2012)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364687"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00972-3_7"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808138.2808152","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808138.2808152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:45Z","timestamp":1750273425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808138.2808152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":19,"alternative-id":["10.1145\/2808138.2808152","10.1145\/2808138"],"URL":"https:\/\/doi.org\/10.1145\/2808138.2808152","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}