[1] مهدی تیموری، «آشکارسازی سیگنال لینک 16»، مجله مهندسی برق دانشگاه تبریز، جلد 46، شماره 4، ص. 84-87، 1395.
[2] مهدی تیموری، حمیدرضا کاکایی مطلق و مرتضی حدادی، «شناسایی کور کدهای ضربی BCH»، مجله مهندسی برق دانشگاه تبریز، جلد 47، شماره 1، ص. 49-54، 1396.
[3] E. S. Pilli, R. C. Joshi, and R. Niyogi, "Network forensic frameworks: Survey and research challenges," digital investigation, vol. 7, pp. 14-27, 2010.
[4] G. Kessler. File Signature Table, 16 December 2017, https://www.garykessler.net/library/file_sigs.html.
[5] M. McDaniel and M. H. Heydari, "Content based file type detection algorithms," in Proceedings of the 36th International Conference onAnnual Hawaii International Conference on,System Sciences, pp. 1-10, 2003.
[6] W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog, "Fileprints: Identifying file types by n-gram analysis," in Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, pp. 64-71, 2005.
[7] M. Karresand and N. Shahmehri, "Oscar—file type identification of binary data in disk clusters and ram pages," in Security and privacy in dynamic environments, ed: Springer, pp. 413-424, 2006.
[8] M. Karresand and N. Shahmehri, "File type identification of data fragments by their binary structure," in Information Assurance Workshop, 2006 IEEE, pp. 140-147, 2006.
[9] S. J. Moody and R. F. Erbacher, "Sádi-statistical analysis for data type identification," in Third International Workshop onSystematic Approaches to Digital Forensic Engineering, SADFE'08., pp. 41-54, 2008.
[10] C. J. Veenman, "Statistical disk cluster classification for file carving," in Information Assurance and Security, 2007. IAS 2007. Third International Symposium on, pp. 393-398, 2007.
[11] W. C. Calhoun and D. Coles, "Predicting the types of file fragments," Digital Investigation, vol. 5, pp. S14-S20, 2008.
[12] M. C. Amirani, M. Toorani, and A. Beheshti, "A new approach to content-based file type detection," in Computers and Communications,. ISCC 2008. IEEE Symposium on, pp. 1103-1108, 2008.
[13] K. Nguyen, D. Tran, W. Ma, and D. Sharma, "A New Approach to Executable File Fragment Detection in Network Forensics," in Network and System Security, ed: Springer, pp. 510-517, 2014.
[14] N. L. Beebe, L. A. Maddox, L. Liu, and M. Sun, "Sceadan: using concatenated n-gram vectors for improved file and data type classification," IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1519-1530, 2013.
[15] M. Norouzi, D. J. Fleet, and R. R. Salakhutdinov, "Hamming distance metric learning," in Advances in neural information processing systems, pp. 1061-1069, 2012.
[16] D. Ruppert, "What is kurtosis? An influence function approach," The American Statistician, vol. 41, pp. 1-5, 1987.
[17] L. T. DeCarlo, "On the meaning and use of kurtosis," Psychological methods, vol. 2, p. 292, 1997.
[18] R. A. Groeneveld and G. Meeden, "Measuring skewness and kurtosis," The Statistician, pp. 391-399, 1984.
[19] W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog, "Fileprints: Identifying file types by n-gram analysis," in Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, pp. 64-71, 2005.
[20] D. M. Divakaran, Y. S. Liau, and V. L. Thing, "Accurate in-network file-type classification," in Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016: Cyber-Security by Design, p. 139-146, 2016.