Research Article

Detecting ShadowsocksR User Based on Intelligence of Cyber Entities

Figure 2

Comparison of network access between SSR and non-SSR users.