1. T.-S. Ahn, J.-W. Jung, H.-H. Sung, D.-W. Lee and T.-D. Park, Turbo Equalization for Covert Communication in Underwater Channel, Eighth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, 2016.
2. R. Archibald and D. Ghosal, A covert timing channel based on fountain codes, in: Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 11th International Conference on, 2012, pp. 970–977.
3. Covert timing channel detection based on statistical methods;Beyrami;Journal of Electronic & Cyber Defence,2014
4. E. Brown, B. Yuan, D. Johnson and P. Lutz, Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, in: International Conference on Cyber Warfare and Security, 2010, p. 56.
5. S. Cabuk, C.E. Brodley and C. Shields, IP covert timing channels: Design and detection, in: Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004, pp. 178–187.