1. C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, C. Diot, Packet-level traffic measurements from the sprint IP backbone in IEEE Network, IEEE Network (2003). Available from: .
2. T. Karagiannis, A. Broido, N. Brownlee, K.C. Claffy, M. Faloutsos, Is P2P dying or just hiding? in: IEEE GLOBECOM, November 2004.
3. T. Karagiannis, A. Broido, M. Faloutsos, K.C. Claffy, K.C. Transport layer Identification of P2P traffic, in: Internet Measurement Conference(IMC), October 2004.
4. S. Sen, O. Spatscheck, and D. Wang, Accurate, scalable in network identification of P2P traffic using application signatures, in: WWW2004, May 2004.
5. M. Roesch, SNORT: Lightweight intrusion detection for networks, in: LISA ’99: Proceedings of the 13th USENIX Conference on Systems Administration, November 1999.