2ZHONG Y F, ZHANG L P. Sub-Pixel Mapping Based on Artificial Immune Systems for Remote Sensing Imagery [J]. Pattern Recognition, 2013, 46(11): 2902--2926.
3ZITAR R A, HAMDAN A. Genetic Optimized Artificial Immune System in Spam Detectiom a Review and a Model [J]. Artificial Intelligence Review, 2013, 40(3): 305--377.
4VENKATESAN S, BASKARAN R, CHELLAPPAN C, et al. Artificial Immune System Based Mobile Agent Platform Protection [J]. Computer Standards ~ Interfaces, 201a, 35(4): 365--373.
5KIM G, LEE S, KIM S. A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detec- tion[J]. Expert Systems with Applications, 2014, 41(4) : 1690--1700.
6LOUVIERIS P, CLEWLEY N, LIU X H. Effects-Based Feature Identification for Network Intrusion Detection [J]. Neurocomputing, 2013, 121(18):265--273.
7GUO C, ZHOU Y J, PING Y, et al. Efficient Intrusion Detection Using Representative Instances [J]. Computers ~ Se- curity, 2013, 39(4).. 255--267.
8CHEN W, LIU X J, LI T, et al. A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Applica- tion in Anomaly Detection [J]. International Journal of Computational Intelligence Systems, 2011, 4(4) .. 410--419.
9WEN C, DING X M, TAO L, et al. Negative Selection Algorithm Based on Grid File of the Feature Space [J]. Knowl- edge-Based Systems, 2014, 56(C):26--35.
10FORREST S, PERELSON A S, ALLEN L, et al, Self-nonself Discrimination in a Computer [C]//In Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland, CA.. IEEE, 1994: 202--212.