1. [1] The CAIDA UCSD Statistical information for the CAIDA Anonymized Internet Traces. http://www.caida.org/data/passive/passive_trace_statistics.xml, 2016. Accessed 22- February-2017.
2. [2] Simurgh Aryan, Homa Aryan, and J. Alex Halderman. Internet censorship in Iran: A first look. In 3rd USENIX Work- shop on Free and Open Communications on the Internet (FOCI), 2013.
3. [3] Diogo Barradas, Nuno Santos, and Luís Rodrigues. DeltaShaper: Enabling unobservable censorship-resistant TCP tunneling over videoconferencing streams. Privacy Enhancing Technologies, 2017(4):1-18, 2017.
4. [4] Cecylia Bocovich and Ian Goldberg. Slitheen: Perfectly imitated decoy routing through traffic replacement. In Pro- ceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS ’16, pages 1702-1714. ACM, 2016.
5. [5] Jacopo Cesareo, Josh Karlin, Michael Schapira, and Jennifer Rexford. Optimizing the placement of implicit proxies. Technical report, Princeton, NJ, USA, 2012.