1. J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99-TR-028, Carnegie Mellon Software Engineering Institute, 1999.
2. Thomas Bäck, D. B. Fogel, and Z. Michalewicz, editors. Evolutionary Computation 1: Basic Algorithms and Operators. Institute of Physics, Bristol (UK), 2000.
3. Dipankar Dasgupta, editor. Artificial Immune Systems and Their Applications. Springer-Verlag, Berlin, 1998.
4. Stephanie Forrest and Steven A. Hofmeyr. Immunology as Information Processing. In Design Principles for the Immune Systems and Other Distributed Autonomous System, pages 361–388. Oxford University Press, 2001. Available electronically at URL ftp://ftp.cs.unm.edu/pub/forrest/iaip.ps .
5. David E. Goldberg. Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Reading, MA, 1989.