[1]Hofmeyr S,Forrest S. Immunity by design: An artificial immune system[C]/ / Wolfgan B,Jason M D,et al,eds. Proc of the Genetic and Evolutionary Computation Conf. San Francisco: Morgan Kaufman Publishers,1999.
[2]De Castro L N,Timmis J. Artificial Immune Systems: A New Computational Intelligence Approach[M]. Heidelberg: Springer- Verlag,2002.
[3]Kelsey J,Hender S B,Seymour R M. A stochastic model of the interleukin ( IL) 21 B network [C]/ /Proceeding of the 7th International Conference on Artificial Immune Systems. Phuket: Springer,2008: 1 211.
[4]Andrews P S,Timm I S J. Adaptable lymphocytes for artificial immune systems[C]/ /Proceeding of the 7th International Conference on Artificial Immune Systems. Phuket: Springer,2008: 3 762 386.
[5]张宇. 人工免疫系统中阴性选择算法的研究[D]. 杭州: 浙江大学电气工程学院,2007. Zhang Yu. Research on negative selection algorithm of artificial immune system[D]. Hangzhou: School of Electrical Engineering, Zhejiang University,2007. ( in Chinese)
[6]周建国. 网络入侵检测的免疫学建模及其仿真研究[D]. 北京: 北京航空航天大学计算机学院,2002. Zhou Jianguo. Immunological moding of network intrusion detection & its simulate research [D]. Beijing: School of Computer, Beijing University of Aeronautics and Astronautics,2002. ( in Chinese)
[7]Hofmeyr S A. An immunological model of distributed detection and its application to computer security[D]. Albuquerque, NM: Computer Science Department,University of New Mexico,1999.
[8]D’haesseleer P. Further efficient algorithms for generating antibody string,Technical Report CS95-03[R]. New Mexico: The University of New Mexico,1995.