Fig. 5From: RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacksRBP Example. Figure(a) present the original traffic generated by user access website, Figure(b) shows the process of RBP of the original traffic in time A while Figure(c) present the process in time B. Time A and B mean a user accesses a website at different timeBack to article page