A paper presented at the Security and Human Behaviour 2016 conference examining how Tor pluggable transports old up against dozens of detection techniques. Censors focus more on detecting circumvention techniques during the setup phase than after the fact - opposite of most academic work in this area.
http://internet-freedom-science.org/circumvention-survey/sp2016/sok-sp2016.p...