4Hessc M. Models and Analogies in Science[M]. Notre :Notre Dame University Press, 1996. 47450.
5作花济夫.玻璃手册[M].北京:中国建筑工业出版社,1985..
6JRTNR N K.The immune system[J].Scientific American,1973,229 (1):51-60.
7JRTNR N K.Towards a Network Theory of the Immune System[J].Annual Immunology,1974,125:373-389.
8HOU H,DOZIER G.Immunity-based intrusion etection system design,vulnerability analysis,and GENERTIA's genetic arms race[A].2005 ACM Symposium on Applied Computing,SAC'05[C].Santa Fe,New Mexico,USA,2005:952-956.
9HARMER P K,WILLIAMS P D,GUNSCH G H,et al.An artificial immune system architecture for computer security applications[J].IEEE Transactions on Evolutionary Computation 2002,6(3):252-280.
10FABIO A,JUAN C,DIEGO A,ANGELICA V.Discriminating and visualizing anomalies using negative selection and self-organizing maps[A].GECCO'05[C].Washington,DC,USA,2005:297-304.