1. CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism;Ahmad Azuan;International Journal of Communication Networks and Information Security,2017
2. Immunological Recognition of Self;Burnet Frank Macfarlane;Science,2010
3. Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection
4. P Matzinger. 1994. Tolerance Danger and the Extended Family. annual review of immunology 12 1 (1994) 991--1045. P Matzinger. 1994. Tolerance Danger and the Extended Family. annual review of immunology 12 1 (1994) 991--1045.
5. Charles D. Mills Klaus Ley Kurt Buchmann and Johnathan Canton. 2015. Sequential Immune Responses: The Weapons of Immunity. Journal of Innate Immunity (2015) 444--450. Charles D. Mills Klaus Ley Kurt Buchmann and Johnathan Canton. 2015. Sequential Immune Responses: The Weapons of Immunity. Journal of Innate Immunity (2015) 444--450.