1. Alliance, Z.
http://www.zigbee.org
. Accessed 12 July 2010.
2. Mahmood, N. R., Kufa University Education College, Azeez, A. A., Mohammad Kufa University Education College, & Rasool, Z. N., Kufa University Sciences College. Public key steganography.
3. Martins, D., Guyennet, H., & Computer Science Department LIFC, University of Franche-Comte Beasancon. Steganography in MAC layers of 802.15.4 protocol for securing wireless sensor networks.
4. Handel, T. G., & Sanford II, M. T. Hiding data in the OSI network model. In Proceedings of the First International Workshop on Information Hiding, (London, UK) (23–38). Springer.
5. Trabelsi, Z., El Sayed, H., Frikha, L., & Rabie, T. (2007). A novel covert channel based on the IP header record route option. International Journal of Advanced Media and Communication, 1(4), 328–350.