5Forrest S. Self-nonself Discrimination in a Computer[C]//Proceedings of 1994 IEEE Symposium on Research in Security and Privacy. Oakland, Calif, USA: IEEE Computer Society Press, 1994: 202-212.
6Kim J, Bentley E An Evaluation of Negative Selection in an Artificial Immune System for Network Intrusion Detection[C]// Proceedings of the Genetic and Evolutionary Computation Conference. San Francisco, California, USA: [s. n.], 2001: 1330- 1337.
7Grégoire Jacob,Hervé Debar,Eric Filiol.Behavioral detection of malware: from a survey towards an established taxonomy[J]. Journal in Computer Virology . 2008 (3)
9SCHMIDT A-D,ALBAYRAK S.Malicious software for smart-phones. Tech Rep.TUP-DAI02/08-01 . 2008
10SCHMIDT A-D,CLAUSEN J H,CAMTEPE A,et al.Detecting symbian OS malware through static function call analysis. Proceedings of the4th International Conference on Malicious andUnwantedSoftware . 2009