Fig. 7From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingShares of HTTPS client types in the dictionaryBack to article page