1. Pan F., Wu L. F., Du Y. X., Hong Z., Overviews on Protocol Reverse Engineering, Journal of Computer Application Research, 28(2011)2801–2806.
2. Li X. D., Chen L., A Survey on Methods of Automatic Protocol Reverse Engineering, in: Seventh International Conference on Computational Intelligence and Security (CIS 2011), Hainan, (2011), pp. 685–689.
3. Zhang C. C., Zhang H. Y., Improved K-means Algorithm Based on Density Canopy, Knowledge-Based Systems, 145(2018)289–297.
4. Zhang Y. L., Zhou Y. J., Review of Clustering Algorithms, Journal of Computer Applications, 39(2019)1869–1882.
5. Wang Z. F., Wu Y., Unknown Protocol Bit Stream Clustering Based on Improved k-means Algorithm, Journal of Computer Applications, 36(2016)5–8.