A. Houmansadr, T. Coleman, N. Kiyavash, and N. Borisov, “On the channel capacity of network flow watermarking,” 2009.
A. Houmansadr and N. Borisov, “SWIRL: A Scalable Watermark to Detect Correlated Network Flows,” in Network and Distributed System Security Symposium. Internet Society, Feb 2011.
A. Houmansadr, “Design, Analysis, And implementation of effective network flow watermarking schemes,” Doctor of Philosophy in Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, University of Illinois, Urbana-Champaign, 2012.
A. Ahmadi, “Intruder Tracing in Anonymous Networks Using the Network Flow Watermarking,” M.S. Thesis, I.T.C. Department, Imam Hossein Comprehensive University, Tehran, 2014, (in Persian).
A. Houmansadr and N. Borisov, “Towards Improving Network Flow Watermarks using the Repeat-accumulate Codes,” in 36th International Conference on Acoustics, Speech and Signal Processing, 2011.
A. Houmansadr, N. Kiyavash, and N. Borisov, “Rainbow A Robust and Invisible Non-Blind Watermark for Network flow,” in Network and Distributed System Security Symposium, Feb. 2009.
X. Wang and D. S. Reeves, “Robust correlation of encrypted attack traffic through stepping stones by anipulation of interpacket delays,” in ACM Conference on Computer and Communications Security, New York, NY, USA, pp. 20-29, 2003.
J. Luo, X. Wang, and M. Yang, “An interval centroid based spread spectrum watermarking scheme for multi-flow traceback,” Journal of Network and Computer Applications Elsevier, 2011.
J. Huang, X. Pan, X. Fu, and J. Wang, “Long PN Code Based DSSS Watermarking,” presented at the Annual IEEE International Conference on Computer Communications (INFOCOM), 2011.
X.Wang, J. Luo, and M. Yang, “A Double Interval Centroid-Based Watermark for Network Flow Traceback,” in 14th International Conference on Computer Supported Cooperative Work in Design. (CSCWD’2010), Shanghai, China, pp. 146–151, April 2010.
L. Zhang, Z. Wang, Q. Wang, and F. Miao, “MSAC and Multi-flow Attacks Resistant Spread Spectrum Watermarks for network flows,” in Information and Financial Engineering (ICIFE), 2010 2nd IEEE International Conference on, pp. 438-441, 2010.
L. Zhang, J. Luo, and M. Yang, “An Improved DSSS-Based Flow Marking Technique for Anonymous Communication Traceback,” in Multidisciplinary Autonomous Networks and Systems (MANS 09), Brisbane, Australia, pp. 563 - 567, May 2009.
A. Houmansadr, N. Kiyavash, and N. Borisov, “Multi-flow attack resistant watermarks for network flows,” in IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1497-1500, 2009.
Y. J. Pyun, Y. H. Park, X. Wangy, D. S. Reeves, and P. Ning, “Tracing Traffic through Intermediate Hosts that Repacketize Flows,” IEEE Conference on Computer Communications (IN-FOCOM), pp. 634–642, May 2007.
X. Wang, S. Chen, and S. Jajodia, “Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems,” IEEE Symposiumon Security and Privacy, pp. 116–130, 2007.
W. Yu, XinwenFu, S. Graham, D. Xuan, and W. Zhao, “DSSS-Based Flow Marking Technique for Invisible Traceback,” presented at the EEE Security and Privacy Symposium (S&P), 2007.
A. Ahmadi, M. Dehghani, and M. S. Esfehani, “Survey of Intruder Tracing Methods in Anonymous Networks Using The Network Flow Watermarking,” Passive Defence Quarterly, vol. 6, pp. 27-36, Summer 2015. (in Persian)
N. Kiyavash, A. Houmansadr, and N. Borisov, “Multi-flow attacks against network flow watermarking schemes,” in USENIX Security Symposium, Berkeley, CA, USA:USENIX Association, 2008.
Y. J. Pyun, Y. Park, D. S. Reeves, X. Wang, and P. Ning, “Interval-based flow watermarking for tracing interactive traffic,” Computer Networks 56, Elsevier, pp. 1646-1665, 2012.
X. Wang, D. S. Reeves, P. Ning, and F. Feng, “Robust Network-Based Attack Attribution through Probabilistic Watermarking of Packet Flows,” Department of Computer Science, NC State University, 2005.
R. Duda, P. Hart, and D. Stork, “Pattern Classification(2ndEdition),” John Wiley & Sons, 2001.
P. Peng, P. Ning, and D. S. Reeves, “On the secrecy of timing-based active watermarking trace-back techniques,” in IEEE Symposium on Security and Privacy, pp. 334-349, May 2006.
B. Birami, “Covert Timing Channel Detection With Use Statistic Methods,” M.S. Thesis, I.T.C. College, Imam Hossein Comprehensive University, Tehran, 2012. (in Persian).
N. Kiyavash, A. Houmansadr, and N. Borisov, “Multi-flow attacks against network flow watermarks analysis and countermeasures,” arXiv preprint arXiv:1203.1390, 2012.
L. Zhang, Z. Wang, J. Xu, and Q. Wang, “Multi-flow Attack Resistant Interval-Based Watermarks for Tracing Multiple Network Flows,” in Computing and Intelligent Systems, ed: Springer, pp. 166-173, 2011.