1. Danger theory: The link between ais and ids;U Aickelin;Proc. of the Second International Conference on Artificial Immune Systems (ICARIS-03),2003
2. Early detection of internet worm activity by metering icmp destination unreachable messages;G Bakos;Proc. of SPIE: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement,2002
3. Two ways to grow tissue for artificial immune systems;P Bentley;Proc. of the Fourth International Conference on Artificial Immune Systems (ICARIS-05),2005
4. Stopping spam by extrusion detection;R Clayton;Proceedings of the First Conference on Email and Anti Spam,2004
5. Tending Adam's Garden: evolving the cognitive immune self