1E Jonsson,T Olovsson.A quantitative model of the security intrusion process based on attacker behavior[J].IEEE Trans on Software Engineering,1997,23(4):235-245.
2R Ortalo,Y Deswarte,M Kaniche.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Trans on Software Engineering,1999,25(5):633-650.
3B B Madan,K Goeva-Popstojanova,K Vaidyanathan,et al.Modeling and quantification of security attributes of software systems[A].In Proc Int Conf on Dependable Systems and Networks(IPDS stream)[C].Washington,DC,2002,2:505-514.
4C K Chu,M Chu.An integrated framework for the assessment of network operations,reliability,and security[J].Bell Labs Technical Journal,2004,8(4):133-152.
5S A Hofmeyr and S Forrest.Immunity by design:an artificial immune system[A].Proc of the Genetic and Evolutionary Computation Conference (GECCO)[C].Morgan-Kaufmann,San Francisco,1999.1289-1296.
6S A Hofmeyr,S Forrest.Architecture for an artificial immune system[J].Evolutionary Computation,2000,8(4):443-473.
7D Dasgupta.Immunity-based intrusion detection systems:a general framework[A].Proc of the 22nd National Information Systems Security Conference (NISSC)[C],Arlington,Virginia,1999.147-160.
8D Dasgupta,F Gonzalez.An immunity-based technique to characterize intrusions in computer networks[J].IEEE Trans on Evolutionary Computation,2002,6(3):281-291.
9Jungwon Kim,Peter J Bentley.The artificial immune model for network intrusion detection[A].the 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99)[C].Aachen,Germany,1999.
10Jungwon Kim,Peter J Bentley.Evaluating negative selection in an artificial immune system for network intrusion detection[A].Genetic and Evolutionary Computation Conference 2001(GECCO-2001)[C].San Francisco,2001.1330-1337.