[1] XIE Linquan,YU Fei,XU Chen.Distributed Firewall with Intrusion Detection System[J].Journal of Computers,2012,7(12):3 110-3 115.[2] FORREST S,PERELSON A S,ALLEN L,et al.Self-Nonself Discrimination in a Computer[C].Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy.Los Alamos,CA:IEEE Computer Society,1994:202-209.[3] CASTRO L N D,VON ZUBEN F J.The Clonal Selection Algorithm with Engineering Applications[C].Proceedings of the Genetic and Evolutionary Computation Conference.Las Vegas,USA:ACM,2000:36-37.[4] CASTRO L N D,VON ZUBEN F J.An Evolutionary Immune Network for Data Clustering[C].Proceedings of the IEEE Brazilian Symposium on Artificial Neural Networks.Rio de Janeiro,Brazil:IEEE Computer Society,2000:84-89.[5] MATZINGER P.Tolerance,Danger and the Extended Family[J].Annual Review of Immunology,1994,12(1):991-1 045.[6] AICKELIN U,BENTLEY P,CAYZER S,et al.Danger Theory:The Link Between AIS and IDS[C].Proceedings of the Second International Conference on Artificial Immune Systems.Edinburgh:[s.n.],2003:147-155.[7] GREENSMITH J,AICKELIN U,CAYZER S.Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection[C].Proceedings of the 4th International Conference on Artificial Immune Systems.Alberta:[s.n.],2005:153-167.[8] GREENSMITH J,AICKELIN U,TWYCORSS J.Articulation and Clarification of the Dendritic Cell Algorithm[C].Proceeding of International Conference on Artificial Immune System.Oeiras,Portugal:Springer Verlag,2006:404-417.[9] OATES R,KENDALL G,GARIBALDI J M.Frequency Analysis for Dendritic Cell Population Tuning[J].Evolutionary Intelligence,2008,1(2):145-157.[10] 方贤进,王丽,康佳,等.树突细胞算法及其理论研究[J].计算机科学,2015,42(2):131-133;156.[11] EBERHART R,KENNEDY J.A New Optimizer Using Particle Swarm Theory[C].Proceeding of the 6th International Symposium on Micro Machine and Human Science.Piscataway,NJ:IEEE Service Center,1995:39-43.[12] 徐善健.一种基于网络资源的数据挖掘方法[J].湖南城市学院学报:自然科学版,2015,24(2):76-78.[13] 陈岳兵.面向入侵检测的人工免疫系统研究[D].长沙:国防科技大学,2011.