1. Anchor, K.P., Zydallis, J.B., Gunsch, G.H., Lamont, G.B.: Extending the Computer Defense Immune System: Network Intrusion Detection with a Multiobjective Evolutionary Programming Approach. In: Timmis, J., Bentley, P.J. (eds.) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS) Canterbury, UK, pp. 12–21 (2002)
2. Ayara, M., Timmis, J., de Lemos, R., de Castro, L.N., Duncan, R.: Negative Selection: How to Generate Detectors. In: Timmis, J., Bentley, P.J. (eds.) 1st International Conference on Artificial Immune Systems, September 2002, pp. 89–98. University of Kent at Canterbury (2002)
3. Blake, C.L., Merz, C.J.: UCI Repository of machine learning databases. University of California, Department of Information and Computer Science, Irvine (1998),
http://www.ics.uci.edu/~mlearn/MLRepository.html
(accessed April 25, 2005)
4. Burnet, F.M.: The clonal selection theory of immunity. Vanderbilt University Press, Nashville (1959)
5. de Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Approach. Springer, London (2002)