1. H. Yang, T. Li, X. L. Hu, F. Wang,Y. Zou, “A Survey of Artificial Immune System based Intrusion Detection,”The Scientific World Journal, Vol. 2014, pp. 1-11, 2014 2. D. A. B.Fernandes, M. Freire, P. Fazendeiro, and P. R. M. Inacio, “Applications of Artificial Immune Systems to Computer Security: A Survey,”Journal of Information Security and Applications, Vol. 35, pp. 138-159, 2017 3. S. Forrest, A. Perelson, L. Allen,R. Cherukuri, “Self-Nonself Discrimination in a Computer,” inProceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy IEEE, pp. 202-212, Oakland, CA, USA, August 2002 4. A. O. Tarakanov, S. V. Kvachev,A. V. Sukhorukov, “A Formal Immune Network and Its Implementation for on-Line Intrusion Detection,” inProceedings of the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, pp. 394-405, 2005 5. L. Jing, L. Xin,L. Yanming, “TCR Signaling and Immune Response/Tolerance,”Immunological Journal, Vol. 27, pp. 86-89, 2011 6. Wikipedia, “T cell,” (https://en.wikipedia.org/wiki/T_cell, accessed March 2019) 7. J. A. Hilder, N. D. L.Owens, P. J. Hickey, S. N. Cairns, M. Neal, D. P. A. Kilgour, et al., “Chemical Detection using the Receptor Density Algorithm,” IEEE Transactions on Systems Man and Cybernetics Part C Applications and Reviews, Vol. 42, No. 6, pp. 1730-1741, 2012 8. L. N. de Castro and J. Timmis, “Artificial Immune Systems: A New Computational Intelligence Approach,” Artificial Immune Systems: A New Computational Intelligence Paradigm, Springer-Verlay Berlin, Heidelberg, 2002 9. T. Stibor, J. Timmis,C. Eckert, “A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques,” Artificial Immune Systems, Springer Berlin Heidelberg, 2005 10. UCI, “Iris Data Set - UCI Machine Learning Repository,” (http://archive.ics.uci.edu/ml/datasets/Iris, accessed March 2019 11. M. Tavallaee, E. Bagheri, W. Lu,A. A. Ghorbani, “A Detailed Analysis of the KDD CUP 99 Data Set,” inProceedings of 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1-6, July 2009 12. J. Yan, D. Jin, C. W. Lee,P. Liu, “A Comparative Study of off-Line Deep Learning based Network Intrusion,” inProceedings of 2018 Tenth International Conference on Ubiquitous and Future Networks, pp. 299-304, Prague, 2018 |