1. A note on the confinement problem;Lampson,1973
2. Department of defense standard. Department of defense trusted computer system evaluation criteria. —1985. — 116 p.
3. Limitations of end-to-end encryption in secure computer networks: technical report;Padlipsky,1978
4. Brodley, C. IP covert timing channels: design and detection / C. Brodley, S. Cabuk, C. Shields // Proc. CCS. —2004. — P. 178–187.
5. Network covert channels: design, analysis, detection, and elimination: for the degree of doctor of philosophy;Cabuk,2006