1 Dasgupta, D. Immunity-based intrusion detection system: A general framework. In: Proc.22nd Nat.Information Systems Security Conf., Oct. 1999. 147-160.
2 S. A. Hofmeyr and S. Forrest. Architecture for an artificial immune system. Evol. Comput, 2000,8(4) :443-473.
3 Dipankar D., Fabio G.. An immunity-based technique to characterize intrusion in computer networks. IEEE transaction on evolutionary computation, 2002,6: 281-291.
4 D. Dasgupta. Artificial Immune Systems and Their Applications. New York: Springer-Verlag, 1999.
5 Mobile security agents for network traffic analysis. Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX-II). Los Alamitos, CA: IEEE Comput. Soc. Press, 1999.
6 J. O. Kephart.A biologically inspired immune system for computers. Proceedings of Artificial Life IV, R. Brooks and P. Maes, Eds. Cambridge, MA: MIT Press, 1994. 130-139.
7 J.Kim, P.Bentley. The Human Immune System and Network Intrusion Detection.EUFIT'99, September, 1999.
8 Novelty detection in time series data using ideas from immunology. Proc. Int. Conf. Intelligent Systems.1996. 87–92.
9 P.Dhaeseleer,S.Forrest,and P. Helman. An immunological approach to change detection: Algorithms. Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy. Los Alamitos, CA: IEEE Comput. Soc. Press, 1996.110-119.
10 A. Somayaji, S. Hofmeyr, and S. Forrest.Principles of a computer immune system. Proc. 2nd New Security Paradigms Workshop, Sept. 1997. 75-82.
11 Leandro N de Castro, Fernando J Von Zben.. Immune and neural network models: theoretical and empirical comparisons. International Journal of Computational Intelligence and Applications, 2001, 1(3):239 257.
12 Mahalanobis,P.C..On the Generalized Distance in Statistics. Proceedings of the National Institute of Science, Calctta, 12.49-55.
13 Liu-Hailong,Ding-Xiaoqing. Handwritten Chinese character recognition based on mirror image learning and the compound Mahalanobis function. Journal of Tsinghua University. 2006,46(7):1239-1242.
14 梅长林、范金城, 数据分析方法, 北京: 高等教育出版社, 2006:142-153.
15 DARPA Intrusion Detection Evaluation (1999). http://www.ll.mit.edu/IST/ideval/index.html.