Fig. 6
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

Relation of dictionary size and covered portion of network traffic
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
Relation of dictionary size and covered portion of network traffic