1S.Forrest,Hofmeyr,Somayaji.Computer Immunology.Communications of the ACM,1997,40(10):88-96.
2J.Kim,P.Bendey.Towards an Artificial Immune System for Network Intrusion Detection:An Investigation of Dynamic Clonal Selection.The Congress on Evolutionary Computation,Honolulu,2002:1015-1020.
3M.Balazimka,E.Merlo,M.Dagenais,etl.Advanced clone-analysis to support object-oriented system refactoring.Proceedings.Seventh Working Conference on Reverse Engineering,Brisbane,2000:98-107.
4Zejun Wu,Yiwen Liang.Integrated phfform of artificial immune system for anomaly detection.WSEAS Transactions on Information Science and Applications,2005,2(2):144-149.