Research Article

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs

Figure 3

Different deployment modes for HTTA.
(a)
(b)
(c)