|dc.description.references||Forrest, S., Perelson, A. S., Allen, L. and Cherukuri, R., “Self-Nonself Discrimination in a Computer,” Proc. IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1994, pp. 202–212.
Forrest, S., Hofmeyr, S. and Somayaji, A., “Computer Immunology,” Communications of the ACM, vol. 40, no. 10, 1997, pp. 88–96.
Kim, J. and Bentley, P., “Negative selection and niching by an artificial immune system for network intrusion detection,” Proc. Late Breaking Papers at the 1999 Genetic and Evolutionary Computation Conference, Edited by Brave, S. and Wu, A. S., Orlando, Florida, USA, 1999, pp. 149–158.
Kephart, J. O., “A Biologically Inspired Immune System for Computers,” Artificial Life IV: Proceedings of the Fourth International Workshop on the Synthesis and Simulation of Living Systems, Cambridge, MA, US: MIT Press, 1994, pp. 130–139.
Playfair, J. H. L. and Bancroft G. J., Infection and immunity, Oxford; New York: Oxford University Press, 2004.
Matzinger, P., “Tolerance, danger, and the extended family,” Annual Reviews of Immunology, vol. 12, 1994, pp. 991–1045.
Matzinger, P., “The danger model: A renewed sense of self,” Science, vol. 296, no. 5566, 2002, pp. 301.
Aickelin, U. and Cayzer, S., “The Danger Theory and Its Application to Artificial Immune Systems,” Proc. 1st International Conference on ARtificial Immune Systems (ICARIS-2002), Edited by Timmis, J. and Bentley, Peter, University of Kent at Canterbury, UK, 2002, pp. 141–148.
Aickelin, U., Bentley, P., Cayzer, S., Kim, J. and McLeod, J., “Danger Theory: The Link between AIS and IDS?,” Hewlett Packard Labs: HPL-2003-138, 16 July, 2003.
Dasgupta, D. and Yu, S., “Artificial Immune Systems: A Bibliography,” CS Technical Report: CS-03-002, Computer Science Division, The University of Memphis, USA, Dec, 2003.
de Castro, L. N. and Timmis, J., Artificial Immune Systems: A New Combutational Intelligence Approach, Springer-Verlag, 2002.
Dasgupta, D. and Ji, Z. and Gonzalez, F., Artificial Immune System (AIS) Research in the Last Five Years, Proc. Congress on Evolutionary Computation, Edited by Sarker, R. et. al., Canberra, Australia: IEEE Press, 8–12 Dec 2003, pp. 123–130.
Dasgupta, D., Yu, S. and Majumdar, N. S., “MILA - Multilevel Immune Learning Algorithm,” Proc. Genetic and Evolutionary Computation Conference, Edited by. Cantu-Paz, E. et. al., Chicago, USA: Springer-Verlag, 2003, pp. 183–194.
Cohn, M., “An alternative to current thinking about positive selection, negative selection and activation of T cells,” Immunology, Blackwell Publishing, vol. 111, 2004, pp. 375–380.
Janeway, C. and Travers, P., Immunobiology : the immune system in health and disease, Current Biology; London, San Francisco New York: Garland Publishers, 5th Edition, 2001.
Lydyard, P. M., Whelan, A. and Fanger, M. W., Immunology, London: Bios Scientific, 2nd Edition, Instant Notes Series, 2004.
Somayaji, A., Hofmeyr, S. and Forrest, S., “Principles of a Computer Immune System,” Proc. New Security Paradigms Workshop, Great Langdale, Cumbria, UK, 1997, pp. 75–82.
Sompayrac, L., How the immune system works, Malden, Mass.: Blackwell Science, 2nd Edition, 2003.
Esponda, F., Forrest, S. and Helman, P., ”A Formal Framework for Positive and Negative Detection Schemes,” IEEE Transactions on Systems, Man, and Cybernetics- Part B: Cybernetics, vol. 34, no. 1, 2004, pp. 357–373.
Hofmeyr, S. and Forrest, S., “Architecture for an Artificial Immune System,” Evolutionary Computation, vol. 7, no. 1, 2000, pp. 1289–1296.
Cohn, M., “Tritope model of restrictive recognition by the TCR,” Trends in Immunology, vol. 24, no. 3, 2003, pp. 127–131.
Somayaji, A. and Forrest, S., “Automated Response Using System-Call Delays,” Proc. Usenix, San Diego, California, 2000.
Hofmeyr, S. and Forrest, S., “Immunity by Design: An Artificial Immune System,” Proc. Genetic and Evolutionary Computation Conference (GECCO), Edited by. Banzhaf, W. et. al., 1999, pp. 1289–1296.
Williams, P., Anchor, K., Bebo, J., Lamont, G. and Gunsch, G., “CDIS: Towards a Computer Immune System for Detecting Network Intrusions,” Lecture Notes in Computer Science, vol. 2212, 2001, pp. 117–133.
Kim, J., Ong, A. and Overill, R. E., “Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector,” Proc. Congress on Evolutionary Computation, Edited by. Sarker, R. et. al., Canberra, Australia: IEEE Press, 2003, 405–412.
Kendall, K., “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,” Masters Thesis, Massachusetts Institute of Technology, 1999.||en_NZ