1. Cho SB (2003) Chapter 2: Artificial Life Technology for Adaptive Information Processing. In: Nikola K Fuzziness and soft computing. Future directions for intelligent systems and information sciences: the future of speech and image technologies, brain computers, WWW, and bioinformatics, 13.33, vol 45. Heidelberg, Germany: Physica, ISBN 3-7908-1276-5.
2. Dasgupta D (1999) Immunity-based intrusion detection system: a general framework. In: Proceedings of the 22nd national information systems security conference (NISSC). National Institute of Standards and Technology and National Computer Security Center, Hyatt Regency, Crystal City, Virginia, United States
3. Guan Y, Ghorbani AA, Belacel N (2003) Y-means: a clustering method for intrusion detection. In: Canadian conference on electrical and computer engineering, Montreal, Qubec, Canada, pp 1–4
4. Banfield JD, Raftery AE. Model-based gaussian and non-gaussian clustering
5. Kim J, Bentley P (1999a) The Human ImmuneSystem and Network Intrusion Detection, 7th European Conference on Intelligent Techniques and Soft Computing (EUFIT ’99), Aachen, Germany