R. Archibald and D. Ghosal, A Covert Timing Channel Based on Fountain Codes, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.2012-970, 2012.
DOI : 10.1109/TrustCom.2012.21

V. Berk, A. Giani, G. Cybenko, and N. Hanover, Detection of covert channel encoding in network packet delays, p.19, 2005.

S. Cabuk, C. E. Brodley, and C. Shields, IP covert timing channels, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.178-187, 2004.
DOI : 10.1145/1030083.1030108

A. Chen, W. B. Moore, H. Xiao, A. Haeberlen, L. T. Phan et al., Detecting covert timing channels with time-deterministic replay, Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, pp.541-55414, 2014.

W. Gasior and L. Yang, Network covert channels on the Android platform, Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '11, pp.1-61, 2011.
DOI : 10.1145/2179298.2179367

S. Gianvecchio and H. Wang, An Entropy-Based Approach to Detecting Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.8, issue.6, pp.785-797, 2011.
DOI : 10.1109/TDSC.2010.46

URL : http://www.cs.wm.edu/~hnw/paper/tdsc10.pdf

S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia, Model-Based Covert Timing Channels: Automated Modeling and Evasion, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection, pp.211-230, 2008.
DOI : 10.1007/978-3-540-87403-4_12

URL : http://www.cs.wm.edu/~hnw/paper/raid08.pdf

C. G. Girling, Covert Channels in LAN's, IEEE Transactions on Software Engineering, vol.13, issue.2, 1987.
DOI : 10.1109/TSE.1987.233153

R. Holloway and R. Beyah, Covert DCF: A DCF-Based Covert Timing Channel in 802.11 Networks, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp.570-579, 2011.
DOI : 10.1109/MASS.2011.60

F. Iglesias, R. Annessi, and T. Zseby, DAT detectors: uncovering TCP/IP covert channels by descriptive analytics, sec, pp.3011-30291531, 2016.
DOI : 10.1109/TE.2015.2417512

M. Kamber, L. Winstone, W. Gong, S. Cheng, and J. Han, Generalization and decision tree induction: efficient classification in data mining, Proceedings Seventh International Workshop on Research Issues in Data Engineering. High Performance Database Management for Large-Scale Applications, pp.111-120, 1997.
DOI : 10.1109/RIDE.1997.583715

URL : http://www-faculty.cs.uiuc.edu/~hanj/pdf/ride97.pdf

N. Kiyavash and T. Coleman, Covert timing channels codes for communication over interactive traffic, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.1485-1488, 2009.
DOI : 10.1109/ICASSP.2009.4959876

X. Luo, E. W. Chan, and R. K. Chang, Tcp covert timing channels: Design and detection, IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), pp.420-429, 2008.

W. Mazurczyk and K. Szczypiorski, Steganography of VoIP Streams, pp.1001-1018, 2008.
DOI : 10.1109/SECCOM.2007.4550357

M. A. Padlipsky, D. W. Snow, and P. A. Karger, Limitations of end-to-end encryption in secure computer networks, pp.78-158
DOI : 10.21236/ADA059221

Y. Saeys, I. Inza, and P. Larraaga, A review of feature selection techniques in bioinformatics, Bioinformatics, vol.23, issue.19, pp.2507-2517, 2007.
DOI : 10.1093/bioinformatics/btm344

G. Shah, A. Molina, and M. Blaze, Keyboards and covert channels, Proceedings of the 15th Conference on USENIX Security Symposium -Volume USENIX- SS'06, USENIX Association, 2006.

J. Shen, S. Qing, Q. Shen, and L. Li, Optimization of covert channel identification, Security in Storage Workshop, 2005. SISW '05. Third IEEE International, pp.13-95, 2005.

P. L. Shrestha, M. Hempel, F. Rezaei, and H. Sharif, A Support Vector Machine-Based Framework for Detection of Covert Timing Channels, IEEE Transactions on Dependable and Secure Computing, vol.13, issue.2, pp.274-283, 2016.
DOI : 10.1109/TDSC.2015.2423680

T. Sohn, J. Seo, J. Moon, R. J. Walls, K. Kothari et al., A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine TU Wien CN Group: Data Analysis and Algorithms (2017), https://www.cn.tuwien.ac.at/public/data.html 23 Liquid: A detection-resistant covert timing channel based on {IPD} shaping, Computer Networks, vol.22, issue.556, pp.313-324, 2003.

S. Wendzel, S. Zander, B. Fechner, and C. Herdin, Pattern-Based Survey and Categorization of Network Covert Channel Techniques, ACM Computing Surveys, vol.47, issue.3, pp.1-5026, 2015.
DOI : 10.1007/11553939_151

J. C. Wray, An Analysis of Covert Timing Channels, Journal of Computer Security, vol.1, issue.3-4, pp.219-232, 1992.
DOI : 10.3233/JCS-1992-13-403

J. Wu, Y. Wang, L. Ding, and X. Liao, Improving performance of network covert timing channel through Huffman coding, Advanced Theory and Practice for Cryptography and Future Security, pp.69-79, 2012.
DOI : 10.1016/j.mcm.2011.01.051

S. Zander, G. Armitage, and P. Branch, An Empirical Evaluation of IP Time To Live Covert Channels, 2007 15th IEEE International Conference on Networks, pp.42-47, 2007.
DOI : 10.1109/ICON.2007.4444059

S. Zander, G. Armitage, and P. Branch, A survey of covert channels and countermeasures in computer network protocols, IEEE Communications Surveys & Tutorials, vol.9, issue.3, pp.44-57, 2007.
DOI : 10.1109/COMST.2007.4317620

S. Zander, G. Armitage, and P. Branch, Stealthier Inter-packet Timing Covert Channels, Proceedings of the 10th International IFIP TC 6 Conference on Networking -Volume Part I, pp.458-47011, 2011.
DOI : 10.1007/978-3-642-20757-0_36

URL : https://hal.archives-ouvertes.fr/hal-01583422

C. Zhiyong and Z. Yong, Entropy based taxonomy of network convert channels, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS), pp.451-455, 2009.
DOI : 10.1109/PEITS.2009.5406973

X. Zi, L. Yao, L. Pan, and J. Li, Implementing a passive network covert timing channel, Computers & Security, vol.29, issue.6, pp.686-696, 2010.
DOI : 10.1016/j.cose.2009.12.010