1. U. Aickelin, P. Bentley, S. Cayzer, J. Kim, J. McLeod, Danger theory: the link between ais and ids, in: Proceedings of the Second International Conference on Artificial Immune Systems (ICARIS-03), 2003, pp. 147–155.
2. G. Bakos, V.H. Berk, Early detection of internet worm activity by metering icmp destination unreachable messages, in: Proceedings of SPIE: Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement, vol. 4708, August 2002, pp. 33–42.
3. P. Bentley, J. Greensmith, S. Ujjin, Two ways to grow tissue for artificial immune systems, in: Proceedings of the Fourth International Conference on Artificial Immune Systems (ICARIS-05), LNCS 3627, 2005, pp. 139–152.
4. R. Clayton, Stopping spam by extrusion detection, in: Proceedings of the First Conference on Email and Anti Spam, 2004.
5. Tending Adam’s Garden: Evolving the Cognitive Immune Self;Cohen,2004