[1] RIOS R, ONIEVA J A, LOPEZ J. Covert communications through network configuration messages[J]. Computers & Security, 2013, 39(4):34-46. [2] KIYAVASH N, KOUSHANFAR F, COLEMAN T P, et al. A timing channel spyware for the CSMA/CA protocol[J]. IEEE Transactions on Information Forensics & Security, 2013, 8(3):477-487. [3] ELZBIETA Z, WOJCJECH M, KRZYSZTOF S, et al. Trends in steganography[J]. Communications of the ACM, 2014, 57(3):86-95. [4] 吕晓鹏,王文东,龚向阳,等.混合网中的P2P资源共享机制[J].北京邮电大学学报,2011,34(4):113-117.(LYU X P, WANG W D, GONG X Y, et al. A P2P resource sharing mechanism for hybrid network[J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(4):113-117.) [5] 徐钒文.基于P2P的隐蔽匿名通信技术研究[D].北京:北京邮电大学,2012:4-51.(XU F W. Research of anonymous communication technology based on P2P[D]. Beijing:Beijing University of Posts and Telecommunications, 2012:4-51.) [6] 谭庆丰,方滨兴,时金桥,等.StegoP2P:一种基于P2P网络的隐蔽通信方法[J].计算机研究与发展,2014,51(8):1695-1703.(TAN Q F, FANG B X, SHI J Q, et al. StegoP2P:a hidden communication approach in P2P networks[J]. Journal of Computer Research and Development, 2014, 51(8):1695-1703.) [7] 唐红,胡容,朱辉云.BitTorrent网络行为研究综述[J].小型微型计算机系统,2012,33(9):2002-2007.(TANG H, HU R, ZHU H Y. Survey of BitTorrent network behavior studies[J]. Journal of Chinese Computer Systems, 2012, 33(9):2002-2007.) [8] 聂荣,聂林,刘超慧,等.BitTorrent网络特性的测量与研究[J].北京邮电大学学报,2012,35(3):125-128.(NIE R, NIE L, LIU C H, et al. Measurement of the characteristics of the BitTorrent network[J]. Journal of Beijing University of Posts and Telecommunications, 2012, 35(3):125-128.) [9] 鄢羽,唐红.BitTorrent网络节点间流量的数据采集和分析[J].计算机科学,2014,41(6):75-78.(YAN Y, TANG H. Data collection and analysis of traffic flow between peers in BitTorrent network[J]. Computer Science, 2014, 41(6):75-78.) [10] LI Z S, SUN X M, WANG BW, et al. A steganography scheme in P2P network[C]//ⅡHMSP 2008:Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Washington, DC:IEEE Computer Society, 2008:20-24. [11] DESIMONE J, JOHNSON D, YUAN B, et al. Covert channel in the BitTorrent tracker protocol[C]//SM 2012:Proceedings of the 2012 International Conference on Security and Management. New York:Rochester Institute of Technology, 2012:223-226. [12] CUNCHE M, KAAFAR M A, BORELI R. Asynchronous covert communication using BitTorrent trackers[C]//HPCC 2014:Proceedings of the 2014 International Conference on High Performance Computing and Communications. Piscataway, NJ:IEEE, 2014:213-291. [13] 李子帅.基于BitTorrent网络的信息隐藏技术研究[D].长沙:湖南大学,2009:29-44.(LI Z S. Research of information hiding technology based on the BitTorrent network[D]. Changsha:Hunan University, 2009:29-44.) [14] 陈立全,卢苗,胡爱群,等.基于二级定位的编码信道信息隐藏算法[J].通信学报,2013,34(12):120-130.(CHEN L Q, LU M, HU A Q, et al. An information hiding algorithm based on twice positioning in coding channel[J]. Journal on Communications, 2013, 34(12):120-130.) [15] EIDENBENZ R, LOCHER T, WATTENHOFER R. Hidden communication in P2P networks steganographic handshake and broadcast[C]//INFOCOM 2011:Proceedings of the 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies. Piscataway, NJ:IEEE, 2011:954-962. [16] 叶军胜.基于状态模拟的BT网络隐信道研究[D].南京:南京理工大学,2011:38-39.(YE J S. Research of state simulation based on the BT network covert channel[D]. Nanjing:Nanjing University of Science and Technology, 2011:38-39.) |