H. Choi, B. B. Zhu, and H. Lee, “Detecting malicious web links and identifying their attack types.” USENIX Conference on Web Application Development 2011, 2011. [Online]. Available: http://research.microsoft.com/apps/pubs/default.aspx?id=193308
 S. Afroz and R. Greenstadt, “Phishzoo: Detecting phishing websites by looking at them,” in Fifth IEEE International Conference on Semantic Computing (ICSC) . IEEE, 2011, pp. 368–375.
 “Reflecting on Ten Years of Practice: The Challenges of Digital Security Training for HumanRights
Luís T. A. N. Brandão, Nicolas Christin, George Danezis and Anonymous
 European Court of HumanRights. European Convention on HumanRights, Entry into force on June 2010. (As amended by Protocols No. 11 and 14; supplemented by Protocols Nos. 1,4,6,7 and 13.) PDF file (30 pages) – echr.coe.int website. SHA256: .
 Federal Chief Information Officers Council and Federal Enterprise Architecture. Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance – Version 2.0, December 2, 2011. PDF file (478 pages) – idmanagement.gov website. SHA256: .
 T. K. Frederiksen, T
. https://metrics.torproject.org/ . Accessed September 2018.
 The Tor Project. Who Uses Tor? https://www.torproject.org/about/torusers.html.en . Accessed September 2018.
 United Nations. Universal Declaration of HumanRights (Article 12), 1948. http://www.un.org/en/universal-declaration-human-rights/ . Accessed September 2018.
 C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In 20th Network and Distributed System Security Symposium (NDSS) , 2013.
 D. S. Wallach. A Survey of Peer
Roya Ensafi, Philipp Winter, Abdullah Mueen and Jedidiah R. Crandall
 Tokachu. The not-so-great firewall of China. 2600 Magazine, Winter 2006-2007.
 TorStatus. Tor network status. http://torstatus.blutmagie. de.
 G. Walton. China’s golden shield : corporations and the development of surveillance technology in the People’s Republic of China. International Centre for HumanRights and Democratic Development, 2001.
 Y. A. Wang, C. Huang, J. Li, and K. W. Ross. Queen: Estimating packet loss rate between arbitrary internet hosts. In Passive and Active Network Measurement
Susan E. McGregor, Franziska Roesner and Kelly Caine
Times, February 2013. [Online]. Available: http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-ofmedia-hacked-by-the-chinese.html?_r=0
 -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attackby-china-hackers.html?ref=technology
 HumanRights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American