[1] DARPA, 1999. Intrusion Detection Evaluation. http://www.ll.mit.edu/IST/ideval/index.html.
[2] Dasgupta, D., Gonzalez, F., 2002. An immunity-based technique to characterize intrusions in computer networks. IEEE Trans on Evolutionary Computation, 6(3):281-291.
[3] de Castro, L.N., Von Zuben, F.J., 1999. Artificial Immune Systems: Part I–Basic Theory and Applications. Technical Report–RT DCA 01/99, FEEC/Univ. Campinas, Campinas, Brazil. http://www.dca.fee.unicamp.br/~lnunes/immune.html.
[4] Denning, D., 1987. An intrusion-detection model. IEEE Trans. Software Eng., 13:222-232.
[5] D’haeseleer, P., Forrest, S., Helman, P., 1996. An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.
[6] Forrest, S., Perelson, A., Allen, L., Cherukuri, R., 1994. Self-Nonself Discrimination in A Computer. Proc. of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, p.202-212.
[7] Forrest, S., Hofmeyr, S.A., Somayaji, A., 1996. A Sense of self for UNIX Processes. Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA.
[8] Forrest, S., Hofmeyr, S., Somayaji, A., 1997. Computer immunology. Communications of the ACM, 40(10):88-96.
[9] Harmer, P.K., Williams, P.O., Gunsch, G.H., Lamont, G.B., 2002. An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation, 6(3):252-280.
[10] Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D., 1990. A Network Security Monitor. Proceedings of the IEEE Symposium on Security and Privacy, IEEE Press.
[11] Hofmeyr, S.A., 1999. An Immunological Model of Distributed Detection and Its Application to Computer Security. Ph. D. Dissertation, University of New Mexico.
[12] Hunt, J.E., Cooke, D.E., 1996. Learning using an artificial immune system. Journal of Network and Computer Applications, p.189-212.
[13] Kim, J., Bentley, P.J., 2001. Evaluating Negative Selection in An Artificial Immune System for Network Intrusion Detection. Genetic and Evolutionary Computation Conference 2001 (GECCO-2001), San Francisco, p.1330-1337.
[14] Perelson, A.S., Weisbuch, G., 1997. Immunology for Physicists. Rev. of Modern Physics, 69(4):1219-1265.
Open peer comments: Debate/Discuss/Question/Opinion
<1>