Fig. 1From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingIdentification and enumeration of HTTPS clients behind NATBack to article page