Fig. 3From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingA flow-based cipher suite list and User-Agent pairingBack to article page