1. Open and extensible lgplv3 deep packet inspection library. http://www.ntop.org/products/deep-packet-inspection/ndpi/
2. Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: USENIX Security, vol. 158 (2007)
3. Finamore, A., Mellia, M., Meo, M., Rossi, D.: KISS: stochastic packet inspection classifier for UDP traffic. IEEE/ACM Trans. Netw. 18(5), 1505–1515 (2010)
4. Haffner, P., Sen, S., Spatscheck, O., Wang, D.: ACAS: automated construction of application signatures. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data, MineNet 2005, pp. 197–202. ACM, New York (2005). http://doi.acm.org/10.1145/1080173.1080183
5. Kingma, D., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)