| [1] Handel T, Sandford M. Hiding data in the OSI network model // Anderson R. Information Hiding Workshop (IH 1996). Cambridge, UK: Springer, LNCS, 1996, 1174: 23-38.
 
 [2] Murdoch S, Lewis S. Embedding covert channels into TCP/IP //Proc 7th Information Hiding Workshop. 2005.
 
 [3] Cabuk S, Brodley C, Shields C. IP covert timing channels: Design and detection // Proceedings of the 2004 ACM Conference on Computer and Communications Security. 2004.
 
 [4] Anonymizer . http://www.anonymizer.com.
 
 [5] Dingledine R, Mathewson N, Syverson P. Tor:the second-generation onion router // Proceedings of the 13th USENIX Security Symposium. 2004.
 
 [6] JAP Anonymity & Privacy . http://anon.inf.tu-dresden.de/.
 
 [7] I2P Anonymous Network . http://www.i2p2.de.
 
 [8] Adler M, Maggs B. Protocols for asymmetric communication channels // Proceeding of 39th IEEE Symposium on Foundations of Computer Science(FOCS). Palo Alto, CA, 1998.
 
 [9] Gagie T. Dynamic asymmetric communication
 [J]. Information Processing Letters, 2008, 108(6):352-355.
 
 [10] Feamster N, Balazinska M, Harfst G, et al. Infranet: circumventing Web censorship and surveillance //Proceedings of the 11th USENIX Security Symposium. 2002:247-262.
 
 [11] Xing D S, Shen J Y. A new Markov model for Web access prediction
 [J]. Computing in Science and Engineering, 2002, 4(6):34-39.
 
 [12] Brian, Davison D. Learning Web request patterns //Web Dynamics: Adapting to Change in Content, Size, Topology and Use. Springer, 2004:435-460.
 
 [13] Deshpande M, Karypis G. Selective Markov model for prediction Web page access
 [J]. ACM Transaction on Internet Technology, 2004, 4(2):163-184.
 |