survey of automatic protocol reverse engineering tools." ACM Computing Surveys (CSUR) 48.3 (2015): 1-26. Sija, Baraka D., et al. "Survey on network protocol reverse engineering approaches, methods and [...] network protocol reverse engineering tools." Journal of Computer Virology and Hacking Techniques 14.1 (2018): 53-68. Peters, M., Goltz, J., Wiedenmann, S., & Mundt, T. "Using Machine Learning to Find Anomalies
https://iuk.uni-rostock.de/lehre-studium/abschlussarbeiten/sensoren-in-der-gebaeudeautomation-1-1/