1. Arstechnica(2016).Cluster of megabreaches compromises a whopping 642 million passwords.http://arstechnica.com/security/2016/05/cluster‐of‐megabreaches‐compromise‐a‐whopping‐642‐million‐passwords(accessed on November 22 2018).
2. Bernstein D.S. Zilberstein S. andImmerman N.(2000).The complexity of decentralized control of Markov decision processes.Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence p 32–37. Morgan Kaufmann Publishers Inc. (June 30 – July 3 2000).
3. Borders K.andPrakash A.(2004).Web tap: detecting covert web trac.Proceedings of the 11th ACM Conference on Computer and Communications Security. pp. 110–120. ACM. (October 25–29 2004)
4. Bromberger S.: Co‐Principal Investigator N. (2011).DNS as a covert channel within protected networks.Tech. Rep. WP2011‐01‐01 National Electric Sector Cyber Security Organization (January 2011).
5. Farnham G.(2013).Detecting DNS tunneling.Tech. Rep. SANS Institute InfoSec Reading Room(February 2013).