7Forrest S,Hofmeyr S,Somayaji A.Computer immunology[J].Communications of the ACM,USA,1997,40(10):88-96.
8Mukherjee B,Heberlein L T,Levitt K N,Network intrusion detection[J].IEEE Network,1994,8(3):26-41.
9Kim J,Bentley P.The artificial immune model for network intrusion detection[C].7th European Conference on Intelligent Techniques and Soft Computing,Aachen,Germany,1999:35-40.
10Dasgupta D.Immunity-based intrusion detection system:a general framework[C].In Proc.of the 22 nd NISSC,Arlington,Virginia,USA,1999:113-127.