[1] Hofmeye S,Forrest S.Architecture for an artificial immune system[J]. Evolutionary Computation, 2000, 8(4): 443-473.
[2] Kim J,Bentley P.Towards an artificial immune system for network intrusion detection:an investigation of dynamic clonal selection[A]. Proceeding of the Congress of Evolutionary Computation on 2002(CEC'02)[C]. Washington DC,USA:IEEE Computer Society, 2002, 2: 1015-1020.
[3] Li Tao. Dynamic detection for computer virus based on immune system [J]. Science in China Series F: Information Sciences, 2008, 51(10): 1475-1486.
[4] 严宣辉.应用疫苗接种策略的免疫入侵检测模型[J]. 电子学报, 2009,37(4):780-785. Yan Xuanhui. An artificial immune-based intrusion detection model using vaccination strategy [J]. Acta Electronica Sinica, 2009, 37(4):780-785.
[5] Pawlak Z. Rough sets [J]. International Journal of Computer and Information Science, 1982, 11(5):341-356.
[6] 苗夺谦,李道国.粗糙集理论、算法与应用[M]. 北京:清华大学出版社, 2008: 139-207. Miao Duoqian, Li Daoguo. Rough sets theory algorithms and applications [M].Beijing: Tsinghua University Press, 2008: 139-207.
[7] 张玲,白中英.基于粗糙集和人工免疫的集成入侵检测模型[J].通信学报,2013,34(9):166-176. Zhang Ling, Bai Zhongying. Integrated intrusion detection model based on rough set and artificial immune [J].Journey on Communications, 2013, 34(9):166-176. |