%\begin{thebibliography}{99}

@JOURNAL{jour1,
   author = "`Vishal Bharthi"',
   title = "`Practical Development and Deployment of Covert Communication in IPv4"',
   journal = "`Journal on Theoretical and Applied Information Technology"',
   month = "`April"',
   year  =  2007
   }

%\bibitem{jour1} Vishal Bharti, , , Apr 2007

@JOURNAL{jour2,
   author = "Sebastian Zander et.al",
   title = "Covert Channels and Counter Measures in Computer Network Protocols",
   journal = "IEEE communication Magazine on survey an tutorials",
   month = "December",
   year  =  2007
   }

@LNCS{springer1,
    author = "`Gustavus J Simmons"',
    title ="'The Prisoner's Problem and the Subliminal Channel"',
    publisher = "`Springer-Verlag"',
    year =1996
    }
    

@LNCS{springer2
    author = "Gustavus J Simmons",
    title ="The Subliminal Channel and Digital Signatures",
    publisher = "`Springer-Verlag"',
    year =1998
    }

\bibitem{acm1} Sarder Cabuk,Carla Brodley,Clay Sheilds, IP Covert Channel Detection, ACM Transaction on Information and System Security", Vol 12, Article 22, Apr 2009

\bibitem{lnotes1} Zbigniew Golebiewski, Stealing Secrets with SSL/TLS and SSH -Kleptographic Attack, lecture notes at Institute of mathematics and ComputerScience,Wroclaw University of Technology, pg 3-11

\bibitem{treport} Sweety Chauhan, Analysis and Detection of Network Covert channel, Technical Report by Department of COmputerScience and Electrical Engineering,University of Maryland Baltimore County, Dec 2005

\bibitem{acm2} Sarder Cabuk,Carla Brodley,Clay Sheilds, IP Covert Timing Channels : Design and Detection, CCS' 04, Oct 2004

\bibitem{lnotes2} B. W. Lampson, A Note on the Confinement Problem, Communication of the ACM, 1973

\bibitem{lnotes3} Steffen Wendzel, Protocol Channels, HAKIN9,Jun 2009

\bibitem{lnotes4} Philippe NAIN, Basic Elements of Queuing Theory-Application to the Modeling of Computer System,INRIA, Jan 1998

\bibitem{lnotes5} Andreas Willig, A short introduction to queuing theory,lecture notes at Technical University Berlin, Jul 1999

\bibitem{lnotes6} Ivan Adon, Jacques Resing, Queuing Theory, Feb 2002

\bibitem{book1} Adam Young, Malicious Cryptography, \(1^{st}\) edition, Wiley Publishing,Feb 2004, pg 220 -240

\bibitem{book2} William Stallings, Cryptography and Network Security, \(3^{rd}\) Edition, Pearson Publishing, 2006

\bibitem{book3} Jerry Banks et.al. Discrete Event System Simulation, \(3^{rd}\) edition, Prentice Hall, Jan 2001

\bibitem{book4} Andrew Tannebaum, Computer Networks, \(4^{th}\) edition, Pearson Education, 2008

\bibitem{proceeding1} Schaefer M Gold et.al.,Program Confinement in KVM/370 In proceeding of the ACM Annual Conference,1977, pg 404-41

\bibitem{proceeding2} Steven Murdoch, Embedding Covert Channel in to TCP/IP, Information Hiding Workshop, Jul 2005   

%\end{thebibliography}

