1. Houmansadr, A., Brubaker, C., Shmatikov, V.: The parrot is dead: observing unobservable network communications. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 65–79. IEEE (2013)
2. Hjelmvik, E., John, W.: Breaking and improving protocol obfuscation. Technical report 123751, Chalmers University of Technology (2010)
3. Dyer, K.P., Coull, S.E., Ristenpart, T., et al.: Format-transforming encryption: more than meets the DPI. The IACR Cryptology, p. 494. ePrint Archive (2012)
4. Roelker, D.J.: HTTP IDS evasions revisited. Sourcefire Inc. (2003)
5. Hernacki, B., Bennett, J., Hoagland, J.: An overview of network evasion methods. Inf. Secur. Tech. Report 10(3), 140–149 (2005)