1. Malhotra P. Detection of encrypted streams for egress monitoring [thesis]. UMI Microform 1447482. Ames, Iowa: Iowa State University; 2007
2. Razali NM, Wah YB. Power comparisons of Shapiro-Wilk, Kolmogorov-Smirnov, Lilliefors and Anderson-Darling tests. Journal of Statistical Modeling and Analytics. 2011;2(1):21-33. Available from: https://www.researchgate.net/publication/267205556_Power_Comparisons_of_Shapiro-Wilk_Kolmogorov-Smirnov_Lilliefors_and_Anderson-Darling_Tests [Accessed: December 29, 2021]
3. Hahn, D, Apthorpe, N and Feamster, N. Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices [Internet]. 2018. Available from: https://arxiv.org/abs/1805.02722 [Accessed: December 29, 2021]
4. Choudhury P, Kumar KR, Nandi S, Athithan G. An empirical approach towards characterization of encrypted and unencrypted VoIP traffic. Multimedia Tools and Applications. 2020;79:603-631. DOI: 10.1007/s11042-019-08088-w
5. Bassham LE, Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, National Institute of Standards and Technology, Special Publication 800–22 [Internet]. 2010. Available from: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762 [Accessed: December 29, 2021]