1. Aickelin, U., & Cayzer, S. (2002). The danger theory and its application to artificial immune systems. In J. Timmis & P. J. Bentley (Eds.), Proceedings of the first international conference on artificial immune systems (ICARIS) (pp. 141–148). University of Kent at Canterbury, September 2002. University of Kent at Canterbury Printing Unit.
2. Lecture notes in computer science;U. Aickelin,2003
3. Ayara, M., Timmis, J., de Lemos, R., de Castro, L., & Duncan, R. (2002). Negative selection: how to generate detectors. In J. Timmis & P. J. Bentley (Eds.), Proceedings of the first international conference on artificial immune systems (ICARIS) (pp. 89–98). University of Kent at Canterbury, September 2002. University of Kent at Canterbury Printing Unit.
4. Bersini, H. (2002). The immune and the chemical crossover. IEEE Transactions on Evolutionary Computation, 6(3), 306–313.
5. Burgess, M. (1998). Computer immunology. In Proceedings of the 12th USENIX conference on system administration (pp. 283–298). Boston: USENIX Association.