Fig. 8
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

Shares of HTTPS client types in live network traffic
From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
Shares of HTTPS client types in live network traffic