S. L. Brand, Department of Defense Trusted Computer System Evaluation Criteria The Orange Book, 1985.

S. Cabuk, C. E. Brodley, and C. Shields, IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004.
DOI : 10.1145/1030083.1030108

S. Cabuk, C. E. Brodley, and C. Shields, IP Covert Channel Detection, ACM Transactions on Information and System Security, vol.12, issue.4, pp.1-2229, 2009.
DOI : 10.1145/1513601.1513604

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

R. Droms, RFC 2131 -Dynamic Host Configuration Protocols, 1997.

A. Dyatlov, Firepass -Gray-World, Team, 2003.

S. Gianvecchio and H. Wang, An Entropy-Based Approach to Detecting Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.8, issue.6, pp.785-797, 2011.
DOI : 10.1109/TDSC.2010.46

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts, Covert Messaging through TCP Timestamps, Proceedings of the Privacy Enhancing Technologies Workshop (PET), pp.194-208, 2002.
DOI : 10.1007/3-540-36467-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. G. Girling, Covert Channels in LAN's, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.292-296, 1987.
DOI : 10.1109/TSE.1987.233153

V. D. Gligor, A Guide to Understanding Covert Channel Analysis of Trusted Systems The Light Pink Book, 1993.

T. G. Handel and M. T. Sandford, Hiding data in the OSI network model, Proceedings of the First International Workshop on Information Hiding, pp.23-38, 1996.
DOI : 10.1007/3-540-61996-8_29

D. Kaminsky, Tunneling Audio, Video, SSH and pretty much anything else over DNS, 2004.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

S. Li and A. Ephremides, Covert channels in ad-hoc wireless networks. Ad Hoc Netw, pp.135-147, 2010.

N. B. Lucena, G. Lewandowski, and S. J. Chapin, Covert Channels in IPv6, Privacy Enhancing Technologies, pp.147-166, 2006.
DOI : 10.1007/3-540-49380-8_25

X. Luo, E. Chan, and R. Chang, Cloak: A Ten-Fold Way for Reliable Covert Communications, Computer Security -ESORICS 2007, pp.283-298, 2007.
DOI : 10.1007/978-3-540-74835-9_19

J. Mchugh, Covert Channels Analysis: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems, 1996.

C. H. Rowland, Covert channels in the TCP/IP protocol suite, First Monday, vol.2, issue.5, 1996.
DOI : 10.5210/fm.v2i5.528

G. Shah, A. Molina, and M. Blaze, Keyboards and Covert Channels, USENIX- SS'06: Proceedings of the 15th Conference on USENIX Security Symposium, pp.59-75, 2006.

D. Stødle, Ping Tunnel -Send TCP traffic over ICMP, 2005.

M. Wolf, Covert channels in LAN protocols, LANSEC '89: Proceedings on the Workshop for European Institute for System Security on Local Area Network Security, pp.91-101, 1989.
DOI : 10.1007/3-540-51754-5_33