Analysis and countermeasure of the hole in an intrusion detection modeling from immunology
Jing YU Feng WANG
Journal of Computer Applications . 2008, (6): 1407 -1410 .