Fig. 5From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingNetwork traffic represented by top 10 cipher suite listsBack to article page