1. A review of research on protocol specification mining[J];Zhang;Computer Engineering and Applications,2013
2. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering;Meng;PLoS ONE,2017
3. A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection;Song,2020
4. Network protocol fuzz testing for information systems and applications: a survey and taxonomy