M. Baldoni, C. Baroglio, A. Martelli, V. Patti, and C. Schifanella, Verifying Protocol Conformance for Logic-Based Communicating Agents, Proc. 5th Int. Workshop on Comp. Logic in Multi-Agent Systems, CLIMA. pp, pp.192-212, 2005.
DOI : 10.1007/11533092_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.4236

M. Bauer, New covert channels in HTTP, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, 2003.
DOI : 10.1145/1005140.1005152

URL : http://arxiv.org/abs/cs/0404054

A. Bouajjani, J. Esparza, A. Finkel, O. Maler, P. Rossmanith et al., An efficient automata approach to some problems on context-free grammars, Information Processing Letters, vol.74, issue.5-6, pp.5-6, 2000.
DOI : 10.1016/S0020-0190(00)00055-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.4017

J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts, Covert Messaging through TCP Timestamps, Proc. 2nd international conference on privacy enhancing technologies, pp.194-208, 2003.
DOI : 10.1007/3-540-36467-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.2501

C. G. Girling, Covert Channels in LAN's, IEEE Transactions on Software Engineering, vol.13, issue.2, pp.292-296, 1987.
DOI : 10.1109/TSE.1987.233153

V. Gorodetski and I. Kotenko, Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool, Recent Advances in Intrusion Detection, pp.219-238, 2002.
DOI : 10.1007/3-540-36084-0_12

M. Handley, V. Paxson, and C. Kreibich, Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics, 10th USENIX Security Symposium, pp.115-131, 2001.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

W. Li and G. He, Towards a Protocol for Autonomic Covert Communication, Proceedings of the 8th international conference on autonomic and trusted computing, pp.106-117, 2011.
DOI : 10.1007/978-3-642-23496-5_8

R. J. Linn and W. H. Mccoy, Producing tests for implementations of OSI protocols, Protocol Specification, Testing, and Verification, pp.505-520, 1983.

N. Lucena, G. Lewandowski, and S. Chapin, Covert Channels in IPv6, Privacy Enhancing Technologies, pp.147-166, 2006.
DOI : 10.1007/3-540-49380-8_25

N. A. Lynch, Distributed Algorithms, 1996.

J. Mchugh, Covert channel analysis, p.80, 1995.

S. J. Murdoch, Covert channel vulnerabilities in anonymity systems, 2007.

B. Ray and S. Mishra, A Protocol for Building Secure and Reliable Covert Channel, 2008 Sixth Annual Conference on Privacy, Security and Trust, pp.246-253, 2008.
DOI : 10.1109/PST.2008.26

C. H. Rowland, Covert channels in the TCP/IP protocol suite, First Monday, vol.2, issue.5, pp.2012-2015, 1997.
DOI : 10.5210/fm.v2i5.528

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6325

G. Rozenberg and A. Salomaa, The Mathematical Theory of L Systems, 1980.

D. Stødle, Ping tunnel ? for those times when everything else is blocked, pp.2012-2015, 2009.

S. Wendzel, The problem of traffic normalization within a covert channel's network environment learning phase, Sicherheit'12. LNI, pp.149-161, 2012.

S. Wendzel and J. Keller, Low-Attention Forwarding for Mobile Network Covert Channels, Communications and Multimedia Security, pp.122-133, 2011.
DOI : 10.1007/978-3-642-24712-5_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.470.6296

F. V. Yarochkin and S. Y. Dai, Towards Adaptive Covert Communication System, 2008 14th IEEE Pacific Rim International Symposium on Dependable Computing, pp.153-159, 2008.
DOI : 10.1109/PRDC.2008.26

S. Zander, G. Armitage, and P. Branch, A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.136-142, 2007.
DOI : 10.1109/COMST.2007.4317620