1. Violating assumptions with fuzzing;Oehlert;IEEE Security and Privacy,2005
2. Snort: Lightweight intrusion detection for networks;Roesch;Proc 13th Systems Administration Conference (LISA),1999
3. Vern P. , Bro: A System for Detecting Network Intruders in Real-Time Computer Networks, 1999, pp. 229–238.
4. Dynamic Binary Instrumentation-Based Framework for Malware Defense
5. Cui W. , Paxson V. , Weaver N. and Katz R. , Protocol-Independent Adaptive Replay of Application Dialog, In 13th Symposium on Network and Distributed System Security, 2006.