Multiresolution Signal Decomposition: Transforms, Subbands and Wavelets, 2001. ,
Xen and the art of virtualization, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp.164-177, 2003. ,
Covert channel detection using process query systems, Proceedings of the Second Annual Workshop on Flow Analysis, 2005. ,
Computation of channel capacity and rate-distortion functions, IEEE Transactions on Information Theory, vol.18, issue.4, pp.460-473, 1972. ,
DOI : 10.1109/TIT.1972.1054855
Network Covert Channels: Design, Analysis, Detection and Elimination, 2006. ,
Detecting covert timing channels, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.211-230, 2007. ,
DOI : 10.1145/1315245.1315284
Modelbased covert timing channels: Automated modeling and evasion, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.211-230, 2008. ,
DOI : 10.1007/978-3-540-87403-4_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1352
Covert Messaging through TCP Timestamps, Proceedings of the Second International Conference on Privacy Enhancing Technologies, pp.194-208, 2002. ,
DOI : 10.1007/3-540-36467-6_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2501
Nonparametric Statistical Methods, 1999. ,
DOI : 10.1002/9781119196037
On the effectiveness of low latency anonymous network in the presence of timing attack, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.429-438, 2009. ,
DOI : 10.1109/DSN.2009.5270306
On Information and Sufficiency, The Annals of Mathematical Statistics, vol.22, issue.1, pp.79-86, 1951. ,
DOI : 10.1214/aoms/1177729694
Experiencing SAX: a novel symbolic representation of time series, Data Mining and Knowledge Discovery, vol.5, issue.2, pp.107-144, 2007. ,
DOI : 10.1007/s10618-007-0064-z
Hide and Seek in Time ??? Robust Covert Timing Channels, Proceedings of the Fourteenth European Conference on Research in Computer Security, pp.120-135, 2009. ,
DOI : 10.1023/B:MTAP.0000026840.45588.64
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6748
On the secrecy of timing-based active watermarking trace-back techniques, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.335-349, 2006. ,
DOI : 10.1109/SP.2006.28
Harmonic Analysis: From Fourier to Wavelets ,
DOI : 10.1090/stml/063
A First Step towards Live Botmaster Traceback, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.59-77, 2008. ,
DOI : 10.1007/978-3-540-87403-4_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.210
Timekeeping in VMWare virtual machines, Palo Alto, California (www.vmware.com/files/pdf/Timekeeping-In-Virtu alMachines, 2011. ,
Tracking anonymous peer-topeer VoIP calls on the Internet, Proceedings of the Twelfth ACM Conference on Computer and Communications Security, pp.81-91, 2005. ,
The Generalization of `Student's' Problem when Several Different Population Variances are Involved, Biometrika, vol.34, issue.1/2, pp.28-35, 1947. ,
DOI : 10.2307/2332510
Predictive mitigation of timing channels in interactive systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.563-574, 2011. ,
DOI : 10.1145/2046707.2046772