Fig. 6From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingRelation of dictionary size and covered portion of network trafficBack to article page