Fig. 4From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingAssigning User-Agents to cipher suite listsBack to article page