1. Efficiently bypassing sni-based https filtering,;Shbair,2015
2. Safe configuration of tls connections,;Atighetchi,2013
3. Polyglot:automatic extraction of protocol message format using dynamic binary analysis,;Caballero,2007
4. Dispatcher:enabling active botnet infiltration using automatic protocol reverse-engineering,;Caballero,2009
5. Computer network vulnerabilities and monitoring,;Badea,2015