[1]KIM J, BENTLEY P J. The human immune system and network intrusion detection [C]// Proceedings of the 7th European Congress on Intelligent Techniques and Soft Computing. Aachen, Germany: EUFIT, 1999: 1120-1125.[2]ZHOU J, DASGUPTA D. V-Detector: an efficient negative selection algorithm with "probably adequate" detector coverage [J]. Information Science, 2009, 179(10): 1390-1406.[3]ZHOU J, DASGUPTA D. Revisiting negative selection algorithms [J]. Evolutionary Computation, 2007, 15(2): 223-251.[4]GONZALEZ F, DASGUPTA D, KOZEMA D. Combining negative and classification techniques for anomaly detection [C]// Proceedings of 2002 Congress on Evolutionary Computation. Piscataway, NJ: IEEE Press, 2002: 705-710.[5]BALACHANDRAN S, DASGUPTA D, NINO F and et al. A framework for evolving multi-shaped detectors in negative selection [C]// Proceedings of the 2007 IEEE Symposium on Foundations of Computational Intelligence. Piscataway, NJ: IEEE Press, 2007: 401-408.[6]王辉,毕晓君,于立君,等. 基于疫苗理论的变阈值免疫阴性选择算法[J].哈尔滨工程大学学报, 2011,32(1): 69-72.[7]方贤进,李龙澍,钱海. 基于人工免疫的网络入侵检测中疫苗算子的作用研究[J]. 计算机科学, 2010, 37(1): 239-242.[8]VIOLATO, R P, AZZOLINI A G, et al. Antibodies with adaptive radius as prototypes of high-dimensional datasets[C]// Proceedings of the 9th International Conference on Artificial Immune Systems. Berlin: Springer, 2010: 158-170.[9]FORREST S, PERELSON A S, ALLEN L. Self-nonself discrimination in a computer [C]// Proceedings of the 1994 IEEE Society Symposium on Research in Security and Privacy. Piscataway, NJ: IEEE Press, 1994: 202-212.[10]ZHOU J. A boundary-aware negative selection algorithm [C]// Proceedings of 2005 International Conference on Artificial Intelligence and Soft Computation. Anaheim, CA, USA: ACTA Press, 2005: 12-14.[11]ZHANG F B, XI L, WANG S W. V-detector optimization algorithm [J]. High Technology Letters, 2012,22(5): 449-454.[12]MACKAY J C. Introduction to Monte carlo methods [M]. Oak Ridge, USA: Oak Ridge National Laboratory, 1995: 23-39.[13]LIU J S. Monte carlo strategies in scientific computing [M]. Berlin: Springer, 2001: 53-77.[14]ZHOU J, DASGUPTA D. Estimating the detector coverage in a negative selection algorithm [C]// Proceedings of 2005 Conference on Genetic and Evolutionary Computation. New York: ACM Press, 2005: 281-288.[15]UCI M L R. Fisher's iris data [DB/OL]. [2009-12-23]. http://archive.ics.uci.edu/ml/datasets/Iris. |