1. Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
2. Detecting backdoors;zhang,2000
3. The design of grids: A graph-based intrusion detection system;cheung,1999
4. Malicious code detection model based on traffic statistical fingerprinting;miao;Computer Engineering,2011
5. Research on the key technologies for malicious code detection in large-scale network;hao,2012