G. Bachmann and L. Narici, Fourier and Wavelet Analysis, 2012.

B. A. Bash, A. H. Gheorghe, M. Patel, J. L. Habif, D. Goeckel et al., Quantumsecure covert communication on bosonic channels, Nature Communications, vol.6, 2015.

B. A. Bash, D. Goeckel, and D. Towsley, Square root law for communication with low probability of detection on awgn channels, Proc. IEEE Int. Symp. Inform. Theory (ISIT), pp.448-452, 2012.

U. N. Bhat, On the busy period of a single server bulk queue with modified service mechanism, Calcutta Statist. Assoc. Bull, vol.13, pp.163-171, 1964.

M. R. Bloch, Covert communication over noisy channels: A resolvability perspective, IEEE Trans. Inf. Theory, vol.62, issue.5, pp.2334-2354, 2016.

P. H. Che, M. Bakshi, C. Chan, and S. Jaggi, Reliable deniable communication with channel uncertainty, Proc. IEEE Int. Symp. Inform. Theory Workshop, pp.448-452, 2013.

T. M. Cover and J. A. Thomas, Elements of Information Theory, 2002.

V. Emeakaroha, M. Netto, T. Ferreto, I. Brandic, and C. Rose, Casvid: Application level monitoring for SLA violation detection in clouds, IEEE Annual Computer Software and Applications Conference (COMPSAC), pp.499-508, 2012.

J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 2009.

M. Harchol-balter, C. Li, T. Osogami, A. Scheller-wolf, and M. Squillante, Analysis of task assignment with cycle stealing under central queue, Proc. Fifteenth ACM Annual Symposium on Parallel Algorithms and Architectures, pp.274-285, 2003.

C. H. Kraft, Some Conditions for Consistency and Uniform Consistency of Statistical Procedures, vol.2, pp.125-142, 1955.

S. Kullback, Information Theory and Statistics, 1968.

E. Lehmann and J. Romano, Testing Statistical Hypotheses, 2005.

T. Osogami, M. Harchol-balter, and A. Scheller-wolf, Analysis of cycle stealing with switching times and thresholds, ACM Sigmetrics, pp.184-195, 2003.

T. Osogami, M. Harchol-balter, and A. Scheller-wolf, Analysis of cycle stealing with switching times and thresholds, Performance Evaluation, vol.61, issue.4, pp.347-369, 2005.

A. Sheikholeslami, M. Ghaderi, D. Towsley, B. Bash, S. Guha et al., Multi-hop routing in covert wireless networks, IEEE Trans. Wireless Communications, vol.17, issue.6, pp.3656-3669, 2018.

T. V. Sobers, B. A. Bash, S. K. Guha, D. Towsley, and D. Goeckel, Covert communication in the presence of an uninformed jammer, IEEE Trans. Wireless Communications, vol.16, issue.9, pp.6193-6206, 2017.

L. Wang, G. W. Wornell, and L. Zheng, Fundamental limits of communication with low probability of detection, IEEE Trans. on Information Theory, vol.62, issue.6, pp.3493-3503, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01345907

, the Dominated Convergence Theorem