1. Competitive environments evolve better solutions for complex tasks;Angeline,1993
2. Baker DW, Christey SM, Hill WH, Mann DE. The development of a common enumeration of vulnerabilities and exposures. In: Second international workshop on recent advances in intrusion detection; 1999.
3. A taxonomy of UNIX system and network vulnerabilities;Bishop,1995
4. BugTraq vulnerability database,2008
5. Computational intelligence: an introduction;Engelbrecht,2002