S. Zander, G. Armitage, and P. Branch, A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007.
DOI : 10.1109/COMST.2007.4317620

S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, Model-Based Covert Timing Channels: Automated Modeling and Evasion, Recent Advances in Intrusion Detection (RAID), 2008.
DOI : 10.1007/978-3-540-87403-4_12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1352

S. H. Sellke, C. Wang, S. Bagchi, and N. B. Shroff, Covert TCP/IP Timing Channels: Theory to Implementation, Conference on Computer Communications (INFOCOM), 2009.
DOI : 10.1109/infcom.2009.5062145

V. Paxson, End-to-end Internet packet dynamics, IEEE/ACM Transactions on Networking, vol.7, issue.3, pp.277-292, 1999.
DOI : 10.1109/90.779192

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.20

M. A. Padlipsky, D. W. Snow, and P. A. Karger, Limitations of End-to-End Encryption in Secure Computer Networks, 1978.

V. Berk, A. Giani, and G. Cybenko, Detection of Covert Channel Encoding in Network Packet Delays, 2005.

G. Shah, A. Molina, and M. Blaze, Keyboards and Covert Channels, USENIX Security, 2006.

S. Gianvecchio and H. Wang, Detecting covert timing channels, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315284

X. Luo, E. W. Chan, and R. K. Chang, TCP Covert Timing Channels: Design and Detection, IEEE/IFIP Conference on Dependable Systems and Networks (DSN), 2008.

Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz et al., Hide and Seek in Time ??? Robust Covert Timing Channels, European Symposium on Research in Computer Security, 2009.
DOI : 10.1109/ISIT.2007.4557351

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.6748

P. Branch, A. Heyde, and G. Armitage, Rapid identification of Skype traffic flows, Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video, NOSSDAV '09, 2009.
DOI : 10.1145/1542245.1542266

C. Henke, C. Schmoll, and T. Zseby, Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements, Passive and Active Measurement (PAM) Workshop, pp.197-206, 2009.
DOI : 10.1007/978-1-4613-8122-8

N. Williams, S. Zander, and G. Armitage, A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification, ACM SIGCOMM Computer Communication Review, vol.36, issue.5, 2006.
DOI : 10.1145/1163593.1163596

R. Kohavi and J. R. Quinlan, Decision-tree Discovery, chapter 16, pp.267-276, 2002.

I. H. Witten and E. Frank, Data mining, ACM SIGMOD Record, vol.31, issue.1, 2005.
DOI : 10.1145/507338.507355

T. M. Cover and J. A. Thomas, Elements of Information Theory, 1991.

S. Zander, CCHEF -Covert Channels Evaluation Framework, 2007.

L. Rizo, D. Torres, J. Dehesa, and D. Muñoz, Cauchy Distribution for Jitter in IP Networks, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008), pp.35-40, 2008.
DOI : 10.1109/CONIELECOMP.2008.39

C. Demichelis and P. Chimento, IP Packet Delay Variation Metric for IP Performance Metrics (IPPM) RFC 3393, IETF, 2002.
DOI : 10.17487/rfc3393