1Kahn C, Porras PA, Staniford-Chen S, et al. A common intrusion detection framework. Submitted to Journal of Computer Security, 1998.
2Intrusion Detection Working Group. The intrusion detection message exchange format (draft-ietf-idwg-idmef-xml-11). 2004. http://www. ietf. org/internet-drafts/draft-ietf-idwg-idmef-xml- 11. txt.
3Intrusion Detection Working Group. The intrusion detection exchange protocol (IDXP). 2002. http://www.ietf.org/internet-drafts/draft-ietf-idwg-beep-idxp-07. txt.
4Prodromidis AL, Chan PK. Meta-learning in distributed data mining systems: issues and approaches. In: Kargupta H, Chan P eds., Book on Advances of Distributed Data Mining. AAAI press, 2000.
5Lee WK. A data mining framework for constructing features and models for intrusion detection systems, [ Ph. D. thesis]. New York: Columbia University, 1999.
6FORREST S, HOFMEYR SA. Immunology as information processing. In Design Principles for the Immune System & Other Distributed Autonomous Systems[A].SEGEL LA, COHEN IR,ed. Santa Fe Institute Studies in the Sciences of Complexity[C]. New York: Oxford University Press, 2000.
7SOMAYAJI A, HOFMEYR SA, FORREST S.Principles of a computer immune system[A]. Langdale, Cumbria: New Security Paradigms Workshop[C], 1997.75-82.
8LEE W, STOLFO SJ.Data mining approaches for intrusion detection[A]. Proceedings of the 7th USENIX Security Symposium[C]. San Antonio, TX, January 1998.
9HOFMEYR SA, FORREST S, D'HAESELEER P.An immunological approach to distributed network intrusion detection[A]. RAID'98[C], Belgium, 1998.
10HOFMEYR SA, FORREST S.Immunity by design: An artificial immune system[A]. Proceedings of Genetic and Evolutionary Computation Conference[C]. San Francisco: Morgan Kaufmamm Publishers, 1999.