[1] Dasgupta Dipankar, Yu Senhua, Nino Fernando. Recent advances in artificial immune systems: models and applications[J]. Applied Soft Computing, 2011, 11(2): 1574-1587.[2] Harmer P K, Williams P D. An artificial immune system architecture for computer security applications[J]. IEEE Transactions on Evolutionary Computation, 2002, 6(3): 252-280.[3] Schmidt A D, Bye R, Schmidt H G, et al. Static analysis of executables for collaborative malware detection on android[C]//Proceedings of the 2009 IEEE International on Ference on Communications. Dresden, Germany, 2009: 1-5[4] Blasing T, Batyuk L, Schmidt A D, et al. An android application sandbox system for suspicious software detection[C]//Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware. Nancy, Lorraine, 2010: 55-62.[5] Forrest S, Perelson A S, Allen L, et al. Self-nonself discrimination in a computer[C]//Proceedings of IEEE Symposium on Research in Security and Privacy. Los Alamitos, CA, USA, 1994: 202-212.[6] Zhou Ji, Dasgupta D. Real-valued negative selection algorithm with variable-sized detectors[C]//Proceedings of GECCO, 2004: 287-298.[7] Gunarathne Thilina, Wu Tak Lon, Qiu Judy, et al. MapReduce in the clouds for science[C]//IEEE Second International Conference on Cloud Computing Technology and Science, 2010: 565-572.[8] Wang Huimin,Huang Xianlin, et al. PSO-optimized negative selection algorithm for anomaly detection[J]. Applications of Soft Computing, 2009: 13-21. |