Fig. 3
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

A flow-based cipher suite list and User-Agent pairing
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
A flow-based cipher suite list and User-Agent pairing