1. P.J. Angeline. Subtree crossover: Building block engine or macromutation? In John R. Koza, Kalyanmoy Deb, Marco Dorigo, David B. Fogel, Max H. Garzon, Hitoshi Iba, and Rick L. Riolo, editors, Genetic Programming 1997: Proceedings of the Second Annual Conference, pages 9–17. Morgan Kaufman, 1997.
2. M. Ayara, J. Timmis, R. de Lemos, L.N. de Castro, and R. Duncan. Negative selection: How to generate detectors. In J. Timmis and P.J. Bentley, editors, Proceedings of the First International Conference on Artificial Immune Systems, pages 89–98. University of Kent, 2002.
3. John A. Clark and Jeremy L. Jacob. Protocols are programs too: the meta-heuristic search for security protocols. Information and Software Technology, 43(14):891–904, 2001.
4. Nichael Lynn Cramer. A representation for the adaptive generation of simple sequential programs. In John J. Greffenstette, editor, Proceedings of the First International Conference on Genetic Algorithms and their Applications, pages 183–187. Erlbaum, 1985.
5. Dipankar Dasgupta and Nii Attoh-Okine. Immunity-based systems: a survey. In Proceedings of the 1997 IEEE International Conference on Systems, Man and Cybernetics. IEEE Press, 1997.