Fig. 5
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

Network traffic represented by top 10 cipher suite lists
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
Network traffic represented by top 10 cipher suite lists