4Dhaeseleer P, Forrest S, Helman E An immunological approach to change algorithms: Analysis and implications[C]. Proc of IEEE Symposium on Security and Privacy. Las Alamitos, 1996: 110-119.
5MacMillan T R. Knowledge based route planning[C]. Proc of IEEE NAECON. Dayton, 1991: 1001-1007.
6Peter M, Adriel L, Marek R, et al. Immune programming[J]. Information Sciences, 2006, 176(8): 972-1002.