A. Akansu and P. Haddad, Multiresolution Signal Decomposition: Transforms, Subbands and Wavelets, 2001.

P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris et al., Xen and the art of virtualization, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp.164-177, 2003.

V. Berk, A. Giani, and G. Cybenko, Covert channel detection using process query systems, Proceedings of the Second Annual Workshop on Flow Analysis, 2005.

R. Blahut, Computation of channel capacity and rate-distortion functions, IEEE Transactions on Information Theory, vol.18, issue.4, pp.460-473, 1972.
DOI : 10.1109/TIT.1972.1054855

S. Cabuk, Network Covert Channels: Design, Analysis, Detection and Elimination, 2006.

S. Gianvecchio and H. Wang, Detecting covert timing channels, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.211-230, 2007.
DOI : 10.1145/1315245.1315284

S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, Modelbased covert timing channels: Automated modeling and evasion, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.211-230, 2008.
DOI : 10.1007/978-3-540-87403-4_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1352

J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts, Covert Messaging through TCP Timestamps, Proceedings of the Second International Conference on Privacy Enhancing Technologies, pp.194-208, 2002.
DOI : 10.1007/3-540-36467-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2501

M. Hollander and D. Wolfe, Nonparametric Statistical Methods, 1999.
DOI : 10.1002/9781119196037

J. Jin and X. Wang, On the effectiveness of low latency anonymous network in the presence of timing attack, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.429-438, 2009.
DOI : 10.1109/DSN.2009.5270306

S. Kullback and R. Leibler, On Information and Sufficiency, The Annals of Mathematical Statistics, vol.22, issue.1, pp.79-86, 1951.
DOI : 10.1214/aoms/1177729694

J. Lin, E. Keogh, L. Wei, and S. Lonardi, Experiencing SAX: a novel symbolic representation of time series, Data Mining and Knowledge Discovery, vol.5, issue.2, pp.107-144, 2007.
DOI : 10.1007/s10618-007-0064-z

Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz et al., Hide and Seek in Time ??? Robust Covert Timing Channels, Proceedings of the Fourteenth European Conference on Research in Computer Security, pp.120-135, 2009.
DOI : 10.1023/B:MTAP.0000026840.45588.64

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6748

P. Peng, P. Ning, and D. Reeves, On the secrecy of timing-based active watermarking trace-back techniques, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.335-349, 2006.
DOI : 10.1109/SP.2006.28

M. Pereyra and L. Ward, Harmonic Analysis: From Fourier to Wavelets
DOI : 10.1090/stml/063

D. Ramsbrock, X. Wang, and X. Jiang, A First Step towards Live Botmaster Traceback, Proceedings of the Eleventh International Symposium on Recent Advances in Intrusion Detection, pp.59-77, 2008.
DOI : 10.1007/978-3-540-87403-4_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.212.210

. Vmware, Timekeeping in VMWare virtual machines, Palo Alto, California (www.vmware.com/files/pdf/Timekeeping-In-Virtu alMachines, 2011.

X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-topeer VoIP calls on the Internet, Proceedings of the Twelfth ACM Conference on Computer and Communications Security, pp.81-91, 2005.

B. Welch, The Generalization of `Student's' Problem when Several Different Population Variances are Involved, Biometrika, vol.34, issue.1/2, pp.28-35, 1947.
DOI : 10.2307/2332510

D. Zhang, A. Askarov, and A. Myers, Predictive mitigation of timing channels in interactive systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.563-574, 2011.
DOI : 10.1145/2046707.2046772