1. Aickelin, U., Bentley, P., Cayzer, S., Kim, J., and McLeod, J. (2003). Danger theory: The link between AIS and IDS. In Proceedings of the 2nd International Conference on Artificial Immune Systems (ICARIS’03), LNCS 2787, pages 147–155. Springer, Berlin, Heidelberg.
2. Aickelin, U., Greensmith, J., and Twycross, J. (2004). Immune system approaches to intrusion detection–a review. In Proceedings of the 3rd International Conference on Artificial Immune Systems (ICARIS), LNCS 3239, pages 316–329. Springer, Berlin, Heidelberg.
3. Bakos, G. and Berk, V. (2002). Early detection of internet worm activity by metering ICMP destination unreachable messages. In Proceedings of the SPIE Conference on Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement (SPIE Vol. 4708), pages 33–42, Orlando, Florida, April.
4. Balthrop, J., Esponda, F., Forrest, S., and Glickman, M. (2002). Coverage and generaliszation in an artificial immune system. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO’02), pages 3–10, New York, 9–13 July. Morgan Kaufmann Publishers.
5. Coico, R., Sunshine, G., and Benjamini, E. (2003). Immunology: A Short Course. Wiley-Liss, New York.