Verifying Protocol Conformance for Logic-Based Communicating Agents, Proc. 5th Int. Workshop on Comp. Logic in Multi-Agent Systems, CLIMA. pp, pp.192-212, 2005. ,
DOI : 10.1007/11533092_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.4236
New covert channels in HTTP, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2003. ,
DOI : 10.1145/1005140.1005152
URL : http://arxiv.org/abs/cs/0404054
An efficient automata approach to some problems on context-free grammars, Information Processing Letters, vol.74, issue.5-6, pp.5-6, 2000. ,
DOI : 10.1016/S0020-0190(00)00055-7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.4017
Covert Messaging through TCP Timestamps, Proc. 2nd international conference on privacy enhancing technologies, pp.194-208, 2003. ,
DOI : 10.1007/3-540-36467-6_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2501
Covert Channels in LAN's, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.292-296, 1987. ,
DOI : 10.1109/TSE.1987.233153
Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool, Recent Advances in Intrusion Detection, pp.219-238, 2002. ,
DOI : 10.1007/3-540-36084-0_12
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics, 10th USENIX Security Symposium, pp.115-131, 2001. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Towards a Protocol for Autonomic Covert Communication, Proceedings of the 8th international conference on autonomic and trusted computing, pp.106-117, 2011. ,
DOI : 10.1007/978-3-642-23496-5_8
Producing tests for implementations of OSI protocols, Protocol Specification, Testing, and Verification, pp.505-520, 1983. ,
Covert Channels in IPv6, Privacy Enhancing Technologies, pp.147-166, 2006. ,
DOI : 10.1007/3-540-49380-8_25
Distributed Algorithms, 1996. ,
Covert channel analysis, p.80, 1995. ,
Covert channel vulnerabilities in anonymity systems, 2007. ,
A Protocol for Building Secure and Reliable Covert Channel, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.246-253, 2008. ,
DOI : 10.1109/PST.2008.26
Covert channels in the TCP/IP protocol suite, First Monday, vol.2, issue.5, pp.2012-2015, 1997. ,
DOI : 10.5210/fm.v2i5.528
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6325
The Mathematical Theory of L Systems, 1980. ,
Ping tunnel ? for those times when everything else is blocked, pp.2012-2015, 2009. ,
The problem of traffic normalization within a covert channel's network environment learning phase, Sicherheit'12. LNI, pp.149-161, 2012. ,
Low-Attention Forwarding for Mobile Network Covert Channels, Communications and Multimedia Security, pp.122-133, 2011. ,
DOI : 10.1007/978-3-642-24712-5_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.470.6296
Towards Adaptive Covert Communication System, 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, pp.153-159, 2008. ,
DOI : 10.1109/PRDC.2008.26
A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.136-142, 2007. ,
DOI : 10.1109/COMST.2007.4317620