1. A.W. Moore, D. Panpagiannaki, Toward the accurate identification of network applications, in: Proceedings of the Sixth Passive and Active Measurement Workshop (PAM 2005), Boston, USA, 2005, pp. 41–54.
2. S. Sen, Oliver Spatscheck, Dongmei Wang, Accurate, scalable in-network identification of P2P traffic using application signatures, in: Proceedings of the 13th International Conference on World Wide Web, New York, USA, May, 2004, pp. 512–521.
3. Thomas Karagiannis, Application-specific payload bit strings, http://www.cs.ucr.edu/~tkarag/papers/strings.txt, Novemeber 2004.
4. H. Patrick, S. Subhabrata, O. Spatschek, D. Wang, ACAS: automated construction of application signatures, in: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data. Philadelphia, Pennsylvania, USA, 2005, pp. 197–202.
5. Internet Inter-Domain traffic;Labovitz;ACM SIGCOMM Comput. Commun. Rev.,2010