1. D. Ourston, S. Matzner, W. Stump, B. Hopkins: Applications of hidden Markov models to detecting multi-stage network attacks, Proc. of the 36th Annual Hawaii International Conference on System Sciences, pp.1-10 (2003).
2. M. Shivakumar1, R. Subalakshmi, S. Shanthakumari, S.J. Joseph: Architecture for Network-Intrusion Detection and Response in open Networks using Analyzer Mobile Agents, International Journal of Scientific Research in Network Security and Communication, Vol. 1, pp.1-7 (2013).
3. H.W. Mo, X.Q. Zuo: Artificial Immune System, Beijing: Science Press (2009).
4. T. Li: Computer immunology, Beijing: Publishing House of Electronics Industry (2004).
5. M. Bateni, A. Baraani, A.A. Ghorbani: Using Artificial Immune System and Fuzzy Logic for Alert Correlation, International Journal of Network Security, Vol. 15, pp.160-174 (2013).