%\begin{thebibliography}{99}

@JOURNAL{jour1,
   author = "`Vishal Bharthi"',
   title = "`Practical Development and Deployment of Covert Communication in IPv4"',
   journal = "`Journal on Theoretical and Applied Information Technology"',
   month = "`April"',
   year  =  2007
   }

%\bibitem{jour1} Vishal Bharti, , , Apr 2007

@JOURNAL{jour2,
   author = "Sebastian Zander et.al",
   title = "Covert Channels and Counter Measures in Computer Network Protocols",
   journal = "IEEE communication Magazine on survey an tutorials",
   month = "December",
   year  =  2007
   }

@SPRINGER{springer1,
    author = "`Gustavus J Simmons"',
    title ="'The Prisoner's Problem and the Subliminal Channel"',
    publisher = "`Springer-Verlag"',
    year =1996
    }
    

@SPRINGER{springer2,
    author = "Gustavus J Simmons",
    title ="The Subliminal Channel and Digital Signatures",
    publisher = "`Springer-Verlag"',
    year =1998
    }

@ACM{acm1,
   author = "Sarder Cabuk,Carla Brodley,Clay Sheilds",
   title = "IP Covert Channel Detection",
   transaction =" ACM Transaction on Information and System Security",
   Volume = 12,
   number = 22,
   month ="April",
   year = 2009   
   }

@LNOTES{lnotes1,
   author = "`Zbigniew Golebiewski"',
   title ="Stealing Secrets with SSL/TLS and SSH -Kleptographic Attacks",
   university ="lecture notes at Institute of mathematics and ComputerScience,Wroclaw University of Technology"
   }
   
@TECHREPORT{treport,
    author ="'Sweety Chauhan"',
    title = "`Analysis and Detection of Network Covert channel"',
    dept = "`Department of COmputerScience and Electrical Engineering"',
    university ="'University of Maryland Baltimore County"',
    month = "`December"',
    year = 2005
    }

@ACM{acm2,
   author = "Sarder Cabuk,Carla Brodley,Clay Sheilds",
   title = "IP Covert Timing Channels : Design and Detection",
   transaction =" CCS' 04",
   month ="October",
   year = 2004   
   }

@ACM{lnotes2,
   author = "B. W. Lampson",
   title = "A Note on the Confinement Problem",
   transaction =" Communication of the ACM",
   year = 1973   
   }

@MAGAZINE{lnotes3,
   author = "Steffen Wendzel",
   title = "Protocol Channels",
   magazine = "HAKIN9",
   month = "June",
   year = 2009
   }
   
@LNOTES{lnotes4,
   author = "Philippe NAIN",
   title = "Basic Elements of Queuing Theory-Application to the Modeling of Computer System",
   orgnisation = "INRIA",
   month = "`January"',
   year = 1998
   }
   

@BOOK{book1,
   author = "Adam Young",
   title = "Malicious Cryptography",
   publisher = "Wiley Publishing",
   year = 2004
   }
   
@BOOK{book2,
   author = "William Stallings",
   title = "Cryptography and Network Security",
   publisher = "Pearson Publishing",
   year = 2006
   }

@BOOK{book3,
   author = "Andrew Tannebaum",
   title = "Computer Networks",
   publisher = "Pearson Education",
   year = 2008
   }

@BOOK{book4,
   author = "Jerry Banks et.al.",
   title = "Discrete Event System Simulation",
   publisher = "Prentice Hall",
   year = 2001
   }

@LNOTES{lnotes5,
   author = "Andreas Willig",
   title = "A short introduction to queuing theory",
   orgnisation = "Technical University Berlin",
   month = "July",
   year = 1999
   } 
   
@LNOTES{lnotes6,
   author = "Ivan Adon, Jacques Resing",
   title = "Queuing Theory",
   orgnisation = "Department of Mathematics and Computing Science Eindhoven University of Technology",
   month = "Feburary",
   year = 2002
   } 


@PROCEEDINGS{proceeding1,
    author = "Schaefer M Gold et.al.",
    title = "Program Confinement in KVM/370",
   proceedings = "proceeding of the ACM Annual Conference",
   year = 1974
    }

@PROCEEDINGS{proceeding2,
    author = "Steven Murdoch",
    title = "Embedding Covert Channel in to TCP/IP",
   proceedings = "Information Hiding Workshop",
   year = 2005
    }

%\end{thebibliography}

