[1] XIE Linquan,YU Fei,XU Chen.Distributed Firewall with Intrusion Detection System[J].Journal of Computers,2012,7(12):3 110-3 115.
[2] FORREST S,PERELSON A S,ALLEN L,et al.Self-Nonself Discrimination in a Computer[C].Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy.Los Alamos,CA:IEEE Computer Society,1994:202-209.
[3] CASTRO L N D,VON ZUBEN F J.The Clonal Selection Algorithm with Engineering Applications[C].Proceedings of the Genetic and Evolutionary Computation Conference.Las Vegas,USA:ACM,2000:36-37.
[4] CASTRO L N D,VON ZUBEN F J.An Evolutionary Immune Network for Data Clustering[C].Proceedings of the IEEE Brazilian Symposium on Artificial Neural Networks.Rio de Janeiro,Brazil:IEEE Computer Society,2000:84-89.
[5] MATZINGER P.Tolerance,Danger and the Extended Family[J].Annual Review of Immunology,1994,12(1):991-1 045.
[6] AICKELIN U,BENTLEY P,CAYZER S,et al.Danger Theory:The Link Between AIS and IDS[C].Proceedings of the Second International Conference on Artificial Immune Systems.Edinburgh:[s.n.],2003:147-155.
[7] GREENSMITH J,AICKELIN U,CAYZER S.Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection[C].Proceedings of the 4th International Conference on Artificial Immune Systems.Alberta:[s.n.],2005:153-167.
[8] GREENSMITH J,AICKELIN U,TWYCORSS J.Articulation and Clarification of the Dendritic Cell Algorithm[C].Proceeding of International Conference on Artificial Immune System.Oeiras,Portugal:Springer Verlag,2006:404-417.
[9] OATES R,KENDALL G,GARIBALDI J M.Frequency Analysis for Dendritic Cell Population Tuning[J].Evolutionary Intelligence,2008,1(2):145-157.
[11] EBERHART R,KENNEDY J.A New Optimizer Using Particle Swarm Theory[C].Proceeding of the 6th International Symposium on Micro Machine and Human Science.Piscataway,NJ:IEEE Service Center,1995:39-43.