Research Article

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature

Figure 3

A schematic of the web server deployment.