1. Network defense: Approaches, methods and techniques;R K Deka;Journal of Network and Computer Applications,2015
2. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits;H J Wang;Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications,2004
3. Toward Fuzz Test Based on Protocol Reverse Engineering;J Cai;Information Security Practice and Experience,2017
4. AFLNet: a greybox fuzzer for network protocols;V.-T Pham;2020 IEEE 13th International Conference on Software Testing, Validation and Verification,2020
5. LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols;F Ma;Proceedings 2023 Network and Distributed System Security Symposium,2023