A. Snoeren, C. Partridge, and L. Sanchez, Single-packet IP traceback, IEEE/ACM Transactions on Networking, vol.10, issue.6, pp.721-734, 2002.
DOI : 10.1109/TNET.2002.804827

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9066

S. Zander, G. Armitage, and P. Branch, A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007.
DOI : 10.1109/COMST.2007.4317620

K. Ahsan and D. Kundur, Practical Data Hiding in TCP, ACM WKSP Multimedia, pp.7-14, 2002.

E. Cauich, R. G. Gardenas, and R. Watanabe, Data Hiding in Identification and Offset IP Fields, 5 th International Symposium, 2005.
DOI : 10.1007/11533962_11

C. Abad, IP checksum covert channels and selected hash collision, 2001.

G. Fisk, M. Fisk, C. Papadopoulos, and J. Neil, Eliminating Steganography in Internet Traffic with Active Wardens, p.5
DOI : 10.1007/3-540-36415-3_2

A. Castiglione, A. D. Santis, U. Fiore, and F. Palmieri, An asynchronous covert channel using spam, Computers & Mathematics with Applications, vol.63, issue.2, pp.437-447, 2012.
DOI : 10.1016/j.camwa.2011.07.068

URL : http://doi.org/10.1016/j.camwa.2011.07.068

U. Fiore, Selective Redundancy Removal: A Framework for Data Hiding, Future Internet, vol.2, issue.1, pp.30-40, 2010.
DOI : 10.3390/fi2010030

E. Tumoian and M. Anikeev, Network Based Detection of Passive Covert Channels in TCP/IP, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l, pp.802-809, 2005.
DOI : 10.1109/LCN.2005.92

J. Zhai, G. Liu, and Y. Dai, A Covert Channel Detection Algorithm Based on TCP Markov Model, 2010 International Conference on Multimedia Information Networking and Security, pp.893-897, 2010.
DOI : 10.1109/MINES.2010.190

S. Gianvecchio and H. Wang, An Entropy-Based Approach to Detecting Covert Timing Channels, IEEE Transactions on dependentable and secure computing, pp.785-797, 2011.
DOI : 10.1109/TDSC.2010.46

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.6085

C. A. Hoare, Communicating Sequential Processes, Communications of the ACM, pp.666-677, 1978.

S. D. Brookes, C. A. Hoare, and A. W. Roscoe, A Theory of Communicating Sequential Processes, Journal of the ACM, vol.31, issue.3, pp.560-599, 1984.
DOI : 10.1145/828.833

A. W. Roscoe, The theory and practice of concurrency. s. l, 1998.

S. A. Schneider, Concurrent and real-time systems: the CSP approach. s. l, 1999.

J. Rutkowska, The implementation of passive covert channels in the Linux kernel

T. G. Handel and M. T. Sandford, Hiding data in the OSI network model, Lecture Notes in Computer Science, vol.1174, pp.23-38, 1996.
DOI : 10.1007/3-540-61996-8_29