1. Lecture Notes in Computer Science;H-J Kang,2003
2. Sen, S., Spatscheck, O., Wang, D.: Accurate scalable in-network identification of P2P traffic using application signature. In: Proceedings of the 13th International Conference on World WideWeb, Madrid, pp. 512–521 (2004)
3. Cui, W., Kannan, J., Wang, H.J.: Discover: automatic protocol reverse engineering from network traces. In: Proceeding of 16th USENIX Security Symposium on USENIX Security Symposium, Austin, pp. 1–14 (2007)
4. Gopalratnam, K., Basu, S., Dunagan, J., Wang, H.: Automatically extracting fields from unknown network protocols. In: First Workshop on Tackling Computer Systems Problems with Machine Learning Techniques
5. Liang: Clustering-based network application recogniztion system. Master thesis, Shandong University, China