[1] Handel T, Sandford M. Hiding data in the OSI network model // Anderson R. Information Hiding Workshop (IH 1996). Cambridge, UK: Springer, LNCS, 1996, 1174: 23-38.
[2] Murdoch S, Lewis S. Embedding covert channels into TCP/IP //Proc 7th Information Hiding Workshop. 2005.
[3] Cabuk S, Brodley C, Shields C. IP covert timing channels: Design and detection // Proceedings of the 2004 ACM Conference on Computer and Communications Security. 2004.
[4] Anonymizer . http://www.anonymizer.com.
[5] Dingledine R, Mathewson N, Syverson P. Tor:the second-generation onion router // Proceedings of the 13th USENIX Security Symposium. 2004.
[6] JAP Anonymity & Privacy . http://anon.inf.tu-dresden.de/.
[7] I2P Anonymous Network . http://www.i2p2.de.
[8] Adler M, Maggs B. Protocols for asymmetric communication channels // Proceeding of 39th IEEE Symposium on Foundations of Computer Science(FOCS). Palo Alto, CA, 1998.
[9] Gagie T. Dynamic asymmetric communication [J]. Information Processing Letters, 2008, 108(6):352-355.
[10] Feamster N, Balazinska M, Harfst G, et al. Infranet: circumventing Web censorship and surveillance //Proceedings of the 11th USENIX Security Symposium. 2002:247-262.
[11] Xing D S, Shen J Y. A new Markov model for Web access prediction [J]. Computing in Science and Engineering, 2002, 4(6):34-39.
[12] Brian, Davison D. Learning Web request patterns //Web Dynamics: Adapting to Change in Content, Size, Topology and Use. Springer, 2004:435-460.
[13] Deshpande M, Karypis G. Selective Markov model for prediction Web page access [J]. ACM Transaction on Internet Technology, 2004, 4(2):163-184.
|