1. Keyboards and covert channels;Shah,2006
2. Unified description for network information hiding methods;Wendzel;J. UCS,2016
3. Covert channels in TCP/IP protocol stack-extended version;Mileva;Cent. Eur. J. Comput. Sci.,2014
4. High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources;Xiao;Comput. Mater. Contin.,2019
5. Model-based covert timing channels: Automated modeling and evasion;Gianvecchio,2008