1. An intrusion detection technique using CO–CO immune system for distributed data networks (CoCo-ISD);Ahmedi;Int. J. Compu.t Sci. Netw. Secur.,2008
2. Afzali Seresht, N., Azmi, R., Pishgoo, B., 2012. A new clonal selection algorithm based on radius regularization of anomaly detectors. In: Proceedings of the IEEE 2012 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP), 2012.
3. Intrusion Detection Systems: A Survey And Taxonomy. Technical Report;Axelsson,2000
4. SHADuDT: secure hypervisor-based anomaly detection based on danger theory;Azmi;Elsevier Comput. Secur. J.,2013
5. Balasubramaniyan, J.S., et al., 1998. An architecture for intrusion detection using autonomous agents. In: Proceedings of 14th Annual Computer Security Applications Conference, Dec. 1998, pp. 13–24.