Fig. 8From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingShares of HTTPS client types in live network trafficBack to article page