1DENNIG D E. An Intrusion- detection Model [J]. IEEE Transactions on Software Engineering. 1987 ,SE- 13(2) :222-232.
2MU KHERJEE B, HEBERLEIN L T, LEVITT K N. Network Intrusion Detection[ J]. IEEE Network, 1994,8 (3) :26 -41.
3FORREST S, HOFMEYR S A. Immunlogy as Processing[A]. Design Priciples for Immune Systems&Other Distributed Autonomous Systems Segal L A. And Cohen I R.. Oxford Univ. Press,2000.
4Marraek P, et al. How the Immune System Recognizes the Body[J]. Scientific American, 1993, 269(3) :85 -89.
5Forrest S, Hofmeyr S, Somayaji A, Longstaff T. A sense of self for UNIX processes [C]. Proc of IEEE Symposium on Research in Security and Privacy. Oakland, CA, IEEEE.1996, 120-128.
6Hofmeyr S A, Forrest S. Immunity by Design: An Artificial Immune System [C]. Proc. Of GECCO'99, 1999, 1289-1296.
7Hofmeyr S A, Forrest S. Architecture for an Artificial Immune System. [D]. Submitted to Evolutionary Computation, 2000.
8Farmer J D, Packard N H, Perelson A S. The Immune System, Adaptation, and Machine Learning [J]. Physics 22D, 1986, 187-204.
9Lee S C, Heinbuch D V. Training a Neural network Based Intrusioon Detector to Recognize Nove Attacks [C]. IEEE Workshop Information Assurance and Security, West Point, NY, 2000.
10Forrest S,Perelson A S.Self-nonself discrimination in a computer[J].IEEE Computer Society Symposium on Research in Security and Privacy,Proceedings,16-18 May 1994:202-212.