1. Ahsan K, Kundur D (2002) Practical data hiding in TCP/IP. In: Proceedings of workshop on multimedia security at ACM multimedia ’02. French Riviera
2. Antunes J, Neves N, Verissimo P (2011) Reverse engineering of protocols from network traces. In: Proceedings of 18th working conference on reverse engineering (WCRE), pp 169–178
3. ASHRAE SSPC 135 (2013) Building automation and control networks (BACnet) (website). http://www.bacnet.org/
4. Backs P, Wendzel S, Keller J (2012) Dynamic routing in covert channel overlays based on control protocols. In: Proceedings of International workshop on information security, theory and practice (ISTP-2012), IEEE pp. 32–39.
5. Berk V, Giani A, Cybenko G (2005) Detection of covert channel encoding in network packet delays. Tech. rep., Department of Computer Science—Dartmouth College