[1] H.-P. Kriegel, P. Kroger and A. Zimek, “Outlier Detection Techniques (Tutorial),” 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Bangkok, 27-30 April 2009.
[2] N. Cristianini and S. J. Taylor, “An Introduction to Support Vector Machines,” Cambridge University Press, Cambridge, 2000.
[3] J. H. Friedman, “Multivariate Adaptive Regression Splines,” Annals of Statistics, Vol. 19, No. 1, 1991, pp. 1-141. doi:10.1214/aos/1176347963
[4] W. Banzhaf, P. Nordin, E. R. Keller, F. D. Francone, “Genetic Programming: An Introduction on the Automatic Evolution of Computer Programs and Its Applications,” Morgan Kaufmann Publishers, Inc., Waltham, 1998.
[5] S. A. Hofmeyr and S. Forrest, “Immunity by Design: An Artificial Immunb System,” Proceedings of the Genetic and Evolutionary Computation Conference, Morgan Kaufmann, San Mateo, 13-17 July 1999, pp. 1289-1296.
[6] J. D. Farmer, N. Packard and A. Perelson, “The Immune System, Adaptation and Machine Learning,” Physica D, Vol. 2, No. 1-3, 1986, pp. 187-204. doi:10.1016/0167-2789(86)90240-X
[7] H. Bersini and F. J. Varela, “Hints for Adaptive Problem Solving Gleaned from Immune Networks,” Parallel Problem Solving from Nature, First Workshop PPSW 1, Dortmund, 1-3 October 1990.
[8] L. N. de Castro and J. Timmis, “Artificial Immune Systems: A New Computational Intelligence Approach,” Springer, Berlin, 2002.
[9] D. Dasgupta, “Immunity-Based Intrusion Detection Systems: A General Framework,” 22nd Nat. Information Systems Security Conference, 2011. http://csrc.nist.gov/nissc/1999/proceedings/papers/p11.pdf
[10] J. D. Farmer, N. H. Packard and A. S. Perelson, “The Immune System, Adaptation, and Machine Learning,” Physica D, Vol. 22, No. 1-3, 1986, pp. 187-204. doi:10.1016/0167-2789(86)90240-X
[11] A. S. Perelson, “Immune Network Theory,” Immunological Reviews, Vol. 110, No. 1, 1989, pp. 5-36. doi:10.1111/j.1600-065X.1989.tb00025.x
[12] F. Varela, A. Coutinho, B. Dupire and N. Vaz, “Cognitive Networks: Immune, Neural and Otherwise,” Theoretical Immunology, Vol. 2, 1988, pp. 359-375.
[13] I. R. Tizard, “Immunology: Introduction,” 4th Edition, Saunders College Publishing, Philadelphia, 1995.
[14] S. A. Hofmeyr and S. Forrest, “Architecture for an Artificial Immune System,” Evolutionary Computation Journal, Vol. 8, No. 4, 2000, pp. 443-473. doi:10.1162/106365600568257
[15] J. Kim and P. Bentley, “The Human Immune System and Network Intrusion Detection,” 7th European Conference on Intelligent Techniques and Soft Computing, Aachen, 1999.
[16] J. Kim and P. J. Bentley, “Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection,” Proceedings of Late-Breaking Papers at the Genetic and Evolutionary Computation Conference, Orlando, 13-17 July 1999, pp. 149-158.
[17] S. Forrest, A. S. Perelson, L. Allen and R. Cherukuri, “Self-Nonself Discrimination in a Computer,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1994, pp. 202-212.
[18] S. Hofmeyr and S. Forrest, “Architecture far ao Ariificial Immune System,” Evolutionary Computation, Vol. 7, No. 1, 1999, pp. 45-68.
[19] G. Doziert, D. Brownf, J. Hurley and K. Cainf, “Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Teams,” Evolutionary Computation, Vol. 1, 2004, pp. 111-116.
[20] J. W. Kim and P. J. Bentley, “Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Clonal Selection with a Negative Selection Operator,” Evolutionary Computation, Vol. 2, 2001, pp. 1244-1252.
[21] R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham and M. A. Zissman, “Evaluating Intrusion Detection Systems: The 1998 Darpa Off-Line Intrusion Detection Evaluation,” Discex, Vol. 2, 2000, p. 1012.
[22] A. Zainal, M. A. Maarof and S. M. Shamsuddin, “Feature Selection Using Rough Set in Intrusion Detection,” 2006 IEEE Region 10 Conference, pp. 1-4.
[23] L. Zhang, G. Zhang, L. Yu, J. Zhang and Y. Bai, “Intrusion Detection Using Rough Set Classification,” Journal of Zheijiang University Science, Vol. 5, No. 9, 2004, pp. 1076-1086. doi:10.1631/jzus.2004.1076