1. Acar, G., Juarez, M., Individual Contributors, 2023. tor-browser-selenium - Tor Browser automation with Selenium [WWW Document]. GitHub Repos. URL https://github.com/webfp/tor-browser-selenium (accessed 7.25.23).
2. A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning;Almubayed;Int. J. Comput. Netw. Inf. Secur.,2015
3. An Empirical Study of Web Browsers’ Resistance to Traffic Analysis and Website Fingerprinting Attacks;Al-Shehari;Cluster Comput.,2018
4. Aminuddin, M.A.I.M., Zaaba, Z.F., Samsudin, A., Juma’at, N.B.A., Sukardi, S., 2020a. Analysis of the Paradigm on Tor Attack Studies, in: 2020 8th International Conference on Information Technology and Multimedia (ICIMU). pp. 126–131. https://doi.org/10.1109/ICIMU49871.2020.9243607.
5. Aminuddin, M.A.I.M., Zaaba, Z.F., Samsudin, A., Juma’at, N.B.A., Sukardi, S., Hussain, A., 2020b. Classification on Deanonymisation Outcome of Tor Attack. Int. J. Adv. Sci. Technol. 29, 1647–1660.