1. Ahsan K, Kundur D. Practical data hiding in TCP/IP. In: Proc. workshop on multimedia security at ACM multimedia, 2002.
2. Stretching the limits of steganography;Anderson,1996
3. Arkin O, Anderson J. Etherleak: Ethernet frame padding information leakage, 2003. Online: 〈http://www.rootsecure.net/content/downloads/pdf/atstake/etherleak/report.pdf〉.
4. An introduction to dynamical systems;Arrowsmith,1990
5. Cabuk S, Brodley CE, Shields C. IP covert timing channels: design and detection. In: Proceedings of the 11th ACM conference on computer and communications security, CCS ׳04. New York, NY, USA: ACM; 2004. p. 178–87.