Fig. 9From: HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingShares of web browsersBack to article page