[1] A. E. Cha and J. Krim. ( 2001) Terrorists' Online Methods
Elusive U.S. Agencies Seek Experts' Help in Tracing Encrypted
Messages. 14 .
[2] K. Eaton, "Deep Inside Alleged Russian Spies," Tech and
Techniques, 2010.
[3] K. Borders and A. Prakash, "Towards Quantification of
Network-Based Information Leaks Via HTTP," USENIX
Workshop on Hot Topics in Security, vol. 3, 2008.
[4] W. Security, "WhiteHat Website Security Statistic Report,"
2013.
[5] V. D. Gligor, "A Guide to Understanding Covert Channel
Analysis of Trusted Systems," National Computer Security
Center, Meade, Maryland, NCSC-TG-030, 1993.
[6] R. A. Kemmerer, "Shared resource matrix methodology: A
practical approach to identifying covert channels," ACM
Transactions on Computer Systems, vol. 1, pp. 2, 277-56, 1983.
[7] R. J. Walls, K. Kothari, and M. Wright, "Liquid: A detectionresistant
covert timing channel based on IPD shaping," Elsevier
Computer Networks, vol. 55, pp. 1217-1228, 2011.
[8] S. Gianvecchio and H. Wang, "Detecting covert timing channels:
an entropy-based approach," in CCS'07: Proceedings of the 14th
ACM conference on Computer and Communications Security,
NY, USA, 2007, pp. 307-316.
[9] S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia,
"Model-Based Covert Timing Channels: Automated Modeling
and Evasion," in Proceedings of Recent Advances in Intrusion
Detection (RAID) Symposium, 2008.
[10] S. H. Sellke, C.C. Wang, S. Bagchi, and N. B. Shroff, "Covert
TCP/IP Timing Channels: Theory to Implementation," in
Proceedings of the 28th Conference on Computer
Communications (INFOCOM), 2009.
[11] X. Zi, L. Yao, L. Pan, and J. Li, "Implementing a passive
network covert timing channel," Elsevier computers & security,
pp. 686–696, 2010.
[12] S. Zander, "Performance of Selected Noisy Covert Channels and
Their Countermeasures in IP Networks," PhD Thesis, Centre for
Advanced Internet Architectures Faculty of Information and
Communication Technologies, Swinburne University of
Technology, Melbourne, 2010.
[13] A. HoumanSadr, "Design, Analysis, and Implementation of
Effective Network flow Watermarking Schemes," PhD Thesis,
Illinois Urbana-Champaign, 2012.
[14] E. J. Daniel, C. M. White, and K. A. Teague, "An Inter-arrival
Delay Jitter Model using Multi-Structure Network Delay
Characteristics for Packet Networks," presented at the 37th
Asilomar Conference on Signal, Systems, and Computers, New
York, 2003.
[15] L. R. Domínguez, D. T. Roman, D. M. Rodríguez, and C. V.
Rosales, "Jitter in IP Networks: A Cauchy Approach," IEEE
COMMUNICATIONS LETTERS, vol. 14, 2010.
[16] Z. pi, E. Kwon, D. Kim, and D. Kim, "Forward link voip packet
delay jitter model," Samsung Electronics Co. C30-20060719-
006, 2006.
[17] T. K. Bandhopadhya, M. Saxena, and A. Tiwari, "Jitter’s Alpha
Stable Distribution Behavior," Computer Technology and
Electronics Engineering (IJCTEE), vol. 3, 2013.
[18] A. Abdolazimi, M. Mohamadi, B. N. Sharif, and A. Akbari,
"Combination of several methods for the recovery of lost packets
and its application in distributed speech recognition," presented
at the the Third International Conference on Information and
Knowledge Technology, Ferdowsi University of Mashhad, 2007.
[19] T. I. Association, "Network Model for Evaluating Multimedia
Transmission Performance Over Internet Protocol," vol. PN-3-
0062-RV1, ed. to be published as ANSI/TIA 921 A, 2007.
[20] I. Cisco Systems, "Packet Loss Model," vol. TR41.3.3/00-02-
005, ed: Ram Jagadeesan, 2000.
[21] R. Flynn and E. Jones, "Robust distributed speech recognition in
noise and packet loss conditions," Digital Signal Processing, pp.
1559-1571, 2010.
[22] J. Mochinac, P. Kocan, and B. Hruˇsovsk, "Packet loss
modeling," in proceedings of The 10th Scientific Conference of
Young Researchers, Kosice Slovakia, 2010.
[23] A. Flo, "User-Perceived Quality of Service in Video on Demand
Services," Master of Science, Department of Telematics,
University of Science and Technology, Norwegian, 2006.