Fig. 10From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingShares of operating systemsBack to article page