参考文献

[1]JIN Z Z, LIAO M H, XIAO G. Survey of negative selection algorithms[J]. Journal on communications,2013,34(1):159-170.

[2]DASGUPTA D, YU S, NINO F. Recent advances in artificial immune systems:Models and applications [J]. Applied soft computing,2011,11:15741587.

[3]STIBOR T, TIMMIS J, ECKERT C. On the appropriateness of negative selection defined over hamming shape-space as a network intrusion detection system [M]. Edinburgh:IEEE Computer Society Press,2005:995-1002.

[4]TIMMIS J, HONE A, STIBOR T, et al. Theoretical advances in artificial immune systems [J]. Theoretical computer science,2008,403:11-32.

[5]BRETSCHER P, COHN M. A theory of self-nonself discrimination [J]. Science,1970,169:1042-1049.

[6]HAESELEER P D, FORREST S, HELMAN P. An immunological approach to change detection:algorithms, analysis, and implications [C]// Proceedings of the 1996 IEEE Symposium on computer security and privacy. Washington DC:[s. n.],1996:110-120.

[7]SOBH T S, MOSTAFA W M. A cooperative immunological approach for detecting network anomaly [J]. Applied soft computing,2011,11:1275-1283.

[8]DASGUPTA D, GONZALEZ F. An immunity-based technique to characterize intrusions in computer networks [J]. IEEE Transactions on evolutionary computation,2002,6(3):281-294.

[9]FORREST S, PERELSON A S, ALLEN L, et al. Self-nonself discrimination in a computer [C]// Proceeding of the IEEE symposium on research in security and privacy. Oakland:IEEE Computer Society Press,1994:202-212.

[10]OU C M. Host-based intrusion detection systems adapted from agentbased artificial immune systems [J]. Neuro computing,2012,88:78-86.

[11]CASTRO L N D, TIMMIS J. An artificial immune network for multimodal function optimization [C]// IEEE World congress on evolutionary computation. [S. l.:s. n.],2002:699-704.

[12]CASTRO L N D, FERNANDO J. Learning and optimization using the clonal selection principle [J]. IEEE transactions on evolutionary computation,2002, 6(3):239-251.

[13]MATZINGER P. The danger model:a renewed sense of self [J]. Science,2002,296(5566):301-305.

[14]李涛.计算机免疫学[M].北京:电子工业出版社,2004.

[15]陈希孺.概率论与数理统计[M].北京:科学出版社,2000.

[16]莫宏伟.人工免疫系统原理与应用[M].哈尔滨:哈尔滨工业大学出版社,2002.

[17]DASGUPTA D. Artificial immune systems and their applications [M]. Berlin:Springer-Verlag,1999.

[18]HAEBERLEN A, ADITYA P, RODRIGUES R, et al. Accountable virtual machines [C]// 9thUSENIX Symposium on Operating Systems Design and Implementation(OSDI'10), [S. l.:s. n.],2010.

[19]高晓明.免疫学教程[M].北京:高等教育出版社,2006.

[20]莫宏伟,左兴权.人工免疫系统[M].北京:科学出版社,2009.

[21]BURNET F M. The clonal selection theory of acquired immunity [M]. Cambridge:Cambridge University Press,1959.

[22]DASGUPTA D, KRISHNAKUMAR K, WONG D, et al. Negative selection algorithm for aircraft fault detection [C]// Proceedings of the 3rd international conference on artificial immune systems. Catania:[s. n.],2004.

[23]JERNE N K. Towards a network theory of the immune system [J]. Annual immunology,1974(125c):373-389.

[24]CASTRO L N D, ZUBEN F J V. The clonal selection algorithm with engineering applications [C]// Proceedings of GECCO'00, Workshop on Artificial Immune Systems and Their Applications. San Fransisco:Morgan Kaufman Publisher, 2000:36-37.

[25]CASTRO L N D. Learning and optimization using the clonal selection principle [J]. IEEE Transactions on evolutionary computation,2002,6(3):239-251.

[26]CASTRO L N D. An evolutionary immune network for data clustering [J]. Sixth brazilian symposium on neural networks,2000(1):84-89.

[27]CASTRO L N D. An artificial immune network for multimodal function optimization [J]. Congress on evolutionary computation,2002(1):699-704.

[28]TIMMIS J, NEAL M, HUNT J. An artificial immune system for data analysis [J]. Biosystems,2000,55(1):143-150.

[29]CASTRO L N D, ZUBEN F J V. aiNet:An Artificial Immune Network for Data Analysis [M]. [S. l.]:Idea Group Publishing,2001.

[30]CASTRO L N D, TIMMIS J I. Artificial immune systems as a novel soft computing paradigm [J]. Soft computing,2003,7(8):526-544.

[31]KIM J, BENTLEY P J. Towards an artificial immune system for network intrusion detection:an investigation of dynamic clonal selection [C]// Proceeding of Congress on Evolutionary Computation. New York:IEEE,2002:1015-1020.

[32]刘若辰,杜海峰,焦李成.免疫多克隆策略[J].计算机研究与发展,2004,41(4):571-576.

[33]YOUNSI R, WENJIA W. A new artificial immune system algorithm for clustering [J]. LNCS,2004,3177:58-64.

[34]CICCAZZO A, CONCA P, NICOSIA G, et al. An advanced clonal selection algorithm with ad hoc network-based hypermutation operators for synthesis of topology and sizing of analog electrical circuits [J]. International conference on artificial immune systems,2008(9):60-70.

[35]HALAVATI R, SHOURAKI S B, HERAVI M J, et al. An artificial immune system with partially specified antibodies [J]. Genetic and evolutionary computation,2007(1):57-62.

[36]MAY P, TIMMIS J, MANDER K. Immune and evolutionary approaches to software mutation testing [J]. International conference on artificial immune systems, 2007(2):336-347.

[37]CUTELLO V, NICOSIA G, PAVONE M, et al. An immune algorithm for protein structure prediction on lattice models [J]. IEEE Transactions on evolutionary computation,2007,11:101-117.

[38]WILSON W O, BIRKIN P, AICKELIN U. Price trackers inspired by immune memory [J]. International conference on artificial immune systems,2006, 4163:362-375.

[39]TIMMIS J, NEAL M, HUNT J. An artificial immune system for data analysis [J]. Biosystems,2002,55(1/3):143-150.

[40]郇嘉嘉,黄少先.基于免疫原理的蚁群算法在配电网恢复中的应用[J].电力系统保护与控制,2008,36(17):28-31.

[41]KIM J, BENTLEY P J, AICKELIN U, et al. Immune system approaches to intrusion detection-a review [J]. Natural computing,2007,6(4):413-466.

[42]李涛.Idid:一种基于免疫的动态入侵检测模型[J].科学通报,2005,50(17):1912-1919.

[43]LI T, LIU X, LI H. A new model for dynamic intrusion detection [C]//The 4th International Conference of Cryptology And Network Security. Berlin:Springer,2005.

[44]李涛.基于免疫的计算机病毒动态检测模型[J].中国科学F辑:信息科学,2009,39(4):422-430.

[45]JAMIE T, AICKELIN U. Towards a conceptual framework for innate immunity [C]// The 3rd International Conference on Artificial Immune Systems. Berlin:Springer,2004.

[46]AICKELIN U, CAYZER S. The danger theory and its application to artificial immune systems [C]// The 1st International Conference on Artificial Immune Systems. Canterbury:[s. n.],2002.

[47]PRIETO C E, NINO F, QUINTANA G. A goalkeeper strategy in robot soccer based on danger theory [C]// IEEE Congress on Evolutionary Computation 2008. Hong Kong:[s. n.],2008.

[48]IQBAL A, MAAROF M A. Danger theory and intelligent data processing [J]. World academy of science engineering and technology,2005,3:110.

[49]SECKER A, FREITAS A, TIMMIS J. Towards a danger theory inspired artificial immune system for webmining [M]// SCIME A. WebMining:Applications and Techniques, Idea Group. [S. l.:s. n.],2005:145-168.

[50]GREENSMITH J, AICKELIN U, TWYCROSS J. Articulation and clarification of the dendritic cell algorithm [C]// The 5th International Conference on ArtificialImmune Systems. Berlin:Springer,2006.

[51]LAY N, BATE I. Applying artificial immune systems to real-time embedded systems [C]//Proc. of CEC'07. Singapore:[s. n.],2007.

[52]GREENSMITH J, AICKELIN U, CAYZER S. Introducing dendritic cells asa novel immune-inspired algorithm for anomaly detection [C]//Proc. of the 4th International Conference on Artificial Immune Systems. Banff:Springer,2005:153-167.

[53]GREENSMITH J. The dendritic cell algorithm [D]. Nottingham, UK:University of Nottingham,2007.

[54]GREENSMITH J, AICKELIN U. Dendritic cells for SYN scan detection [C]//Proc. of GECCO'07. London:ACM Press,2007:49-56.

[55]AL-HAMMADI Y, AICKELIN U, GREENSMITH J. DCA for bot detection [C]//Proc. of CEC'08. Hong Kong:[s. n.],2008:1807-1816.

[56]HOFMEYR S, FORREST S. Immunity by design:An artificial immune system [C]// Proceedings of the Genetic and Evolutionary Computation Conference. [S. l.:s. n.],1999.

[57]HOFMEYR S, FORREST S. Architecture for an artificial immune system [J]. Evolutionary computation,2000,8(4):443-473.

[58]DASGUPTA D. Immunity-based intrusion detection system:A general framework [C]// The 22nd National Information Systems Security Conference. [S. l.:s. n.],1999.

[59]HARMER P K, WILLIAMS P D. An artificial immune system architecture for computer security applications [J]. IEEE Transaction on evolutionary computation,2002,6(3):252-280.

[60]TIMMIS J, EDMONDS C, KELSEY J. Assessing the performance of two immune inspired algorithms and a hybrid genetic algorithm for optimization [C]//Proceedings of Genetic and Evolutionary Computation Conference. Berlin:Springer, 2004:308-317.

[61]曹先彬,郑振,刘克胜,等.免疫进化策略及其在二次布局求解中的应用[J].计算机工程,2000,26(3):1-10.

[62]曹先彬,刘克胜,王煦法.基于免疫遗传算法的装箱问题求解[J].小型微型计算机系统,2000,21(4):361-363.

[63]MORI K, TSUKIYAMA M, FUKUDA T. Adaptive scheduling system inspired by immune system [C]// Proceedings of 1998 IEEE International Conference on Systems, Man, and Cybernetics. New York:IEEE Press,1998:3833-3837.

[64]ENDOH S, TOMA N, YAMADA K. Immune algorithm for n-TSP [C]//Proceedings of IEEE International Conference on Systems, Man and Cybernetics. New York:IEEE Press,1998:3844-3849.

[65]TARAKANOV A O, SKORMIN V A. Pattern recognition by immunocomputing: IEEE world congress on computational intelligence [C]. Hawaii:[s. n.],2002.

[66]KRISHNAKUMAR K, SATYADAS A, NEIDHOEFER J. An immune system framework for integrating computational intelligence paradigms with applications to adaptive control [M]. New York:IEEE Press,1995.

[67]ISHIGURO A, WATANABLE Y, KONDO T, et al. Immunoid:A robot with a decentralized consensus-making mechanism based on the immune system[C]// Proc. Of ICARCV'96. Singapore:[s. n.],1996.

[68]WATKINS A B. AIRS:A resource limited artificial immune classifier [EB/OL]. [2017-03-11]. http://kar.kent.ac.uk/13790/1/ResourceAndrew.pdf.

[69]HUNT J E, COOKE D E. Learning using an artificial immune system [J]. J. of Network and Computer Appl.,1996,19(4):189-212.

[70]HART E, ROSS P. Exploiting the analogy between the immune system and sparse distributed memories [J]. Genetic programming and evolvable machines,2003(4):333-358.

[71]YUE X, MO H W, CHI Z X. Immune-inspired incremental feature selection technology to data stream [J]. Applied soft computing,2008,8(2):1041-1049.

[72]NASRAOUI O, GONZALEZ F, CARDONA C, et al. A scalable artificial immune system model for dynamic unsupervised learning [C]//Proceedings of International Conference on Genetic and Evolutionary Computation. San Francisco:Morgan Kaufmann,2003:219-230.

[73]SECKER A, FREITAS A, TIMMIS J. AISEC:an artificial immune system for email classification [C]// Proceedings of the Congress on Evolutionary Computation. New York:IEEE,2003:131-139.

[74]OKAMOTO T, ISHIDA Y. A distributed approach to computer virus detection and neutrilization by autonomous and heterogeneous agents [C]//Fourth International Symposium Autonomous Decentralized Systems. Tokyo: [s. n.],1999:328-331.

[75]KEPHART J O, SORKIN G B, SWIMMER M, et al. Blueprint for a computer immune system [C]// Proceedings of the Seventh International Virus Bulletin Conference. [S. l.:s. n.],1997:159-173.

[76]WILLIAMS P D, ANCHOR K P, BEBO J L, et al. Cdis:Towards a computer immune system for detecting network intrusions [C]// Proceedings of the 4th International Symposium. Davis, USA:[s. n.],2001:117-133.

[77]王凤先,刘振鹏.一种仿生物免疫的计算机安全系统模型[J].小型微型计算机系统,2003,24(4):698-701.

[78]毛新宇,梁意文.基于免疫原理的防火墙模型[J].武汉大学学报(理学版),2003,49(3):337-340.

[79]李涛.基于免疫的网络监控模型[J].计算机学报,2006,29(9):1515-1522.

[80]李涛.基于免疫的网络安全风险检测[J].中国科学:E辑,2005,35(8):798-816.

[81]ISHIDA Y, ADACHI N. An immune network model and its application to process diagnosis [J]. Systems and computers in Japan,1993,24(6):38-45.

[82]TANG Z, YAMAGUCHI T, TASHIMA K, et al. Multiple-valued immune network model and its simulations [C]// Proceedings of the TwentySeventh International Symposium on Multiple - Valued Logic. New York:IEEE, 1997:519-524.

[83]ALEXANDER C, CELLUAR A. Http://www.ifs.tuwien.ac.at/~aschatt/info/ca/ca.html. Digital Worlds,1999.

[84]FORREST S, HOFMEYR S A, SOMAYAJI A. A sense of self of unix processes [C]// Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy. Los Alamitos:[s. n.],1996.

[85]KNIGHT T, TIMMIS J. A multi-layered immune inspired approach to data mining [C]// Proceedings of the 4th International Conference on Recent Advances in Soft Computing. Nottingham:[s. n.],2002.

[86]SATHYANATH S, SAHIN F. AISIMAM-An artificial immune system based intelligent multi agent model and its application to a mine detection problem [C]// Proceedings of the 1st International Conference on Artificial Immune Systems. Kent:[s. n.],2002.

[87]DASGUPTA D. An artificial immune system as a multi-agent decision support system [C]// Proceedings of the IEEE International Conference on Systems, Man and Cybernetics(SMC). San Diego:[s. n.],1998.

[88]BALLET P, TISSEAU J, HARROUET F. A multi-agent system to model a human humoral response [C]// The proceedings of the 1997 IEEE International Conference on Systems. Orlando:[s. n.],1997.

[89]BALLET P, RODIN V. Immune mechanisms to regulate multi-agents systems [C]// GECCO 2000. Las Vegas:[s. n.],2000.

[90]HARMER P K, LAMONT G B. An agent based architecture for a computer virus immune system [C]// Proceedings of the Genetic and Evolutionary Computation Conference. Orlando:[s. n.],1999.

[91]FOUKIA N, BILLARD D, HARMS P J. Computer system immunity using mobile agents [C]// 8th HP OpenView University Association WS. Berlin:[s. n.],2001.

[92]ISHIDA Y. Active diagnosis by immunity-based agent approach [C]//Proc. International Workshop on Principle of Diagnosis. Val-Morin:[s. n.],1996.

[93]ISHIDA Y. The immune system as a prototype of autonomous decentralized systems:An overview [C]// Proc. of International Symposium on Autonomous Decentralized Systems. Berlin:[s. n.],1997.

[94]TANG Z, YAMAGUCHI T, TASHIMA K, et al. Multiple-valued immune network model and its simualtions [C]// Proc. 27th Int. Symposium on Multiplevalued Logic. Autigonish:[s. n.],1997.

[95]EOGHAN C. Handbook of computer crime investigation [M]. Pittsburgh:Academic press,2002.

[96]JOSEPH G, CHESTER M. Cyber forensics:A military operations perspective [J]. International journal of digital evidence,2002(2):1.

[97]GARCIA K A, MONROY R, TREJO L A, et al. Analyzing log files for postmortem intrusion detection [J]. IEEE Trans. Syst. Man Cybern.,2012,42(6):1690-1704.

[98]CHENG T S, LIN Y D, LAI Y C, et al. Evasion techniques:Sneaking through your intrusion detection/prevention systems [J]. IEEE Commun. surveys tutorials,2012,14(4):1011-1020.

[99]KEUNG G Y, LI B, ZHANG Q. The intrusion detection in mobile sensor network [J]. IEEE/ACM Trans. Netw.(TON),2012,20(4):1152-1161.

[100]WANG Y, FU W, AGRAWAL D P. Gaussian versus uniform distribution for intrusion detection in wireless sensor networks [J]. IEEE Trans. Parallel Distrib. Syst.,2013,24(2):342-355.

[101]SHAKSHUKI E, KANG N, SHELTAMI T. EAACK- A secure intrusion detection system for MANETs [J]. IEEE Trans. Ind. Electron.,2013,60(3):1089-1098.