1. Llamas, D., Allison, C., Miller, A.: Covert Channels in Internet Protocols:A Survey. In: 6th Annual Postgraduate Symposium about Convergence of Telecommunications, Networking and Broadcasting (2005)
2. Rowland, C.H.: Covert channels in the TCP/IP Protocols Suite. First Monday 2(5) (1997)
3. Zander, S., Armitage, G., Branch, P.: Covert channels and countermeasuresin computer network protocols. IEEE Communication Magazine 45(12) (2007)
4. Freire, E.P., Ziviani, A., Salles, R.M.: Detecting Skype flowsin Web traffic. In: Network Operations and Management Symposium, NOMS 2008, April 7-11, pp. 89–96. IEEE, Los Alamitos (2008), doi:10.1109/NOMS.2008.4575121
5. Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 255–263. ACM, New York (2006)