Technology news - The challenge of wi-fi roaming, Computer, vol.36, issue.7, pp.17-19, 2003. ,
DOI : 10.1109/MC.2003.1212682
A Cooperative AIS Framework for Intrusion Detection, 2007 IEEE International Conference on Communications, 2007. ,
DOI : 10.1109/ICC.2007.237
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.522.5316
Self-nonself discrimination in a computer, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994. ,
DOI : 10.1109/RISP.1994.296580
A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, 1996. ,
DOI : 10.1109/SECPRI.1996.502675
An immunity-based technique to characterize intrusions in computer networks, IEEE Transactions on Evolutionary Computation, vol.6, issue.3, 2002. ,
DOI : 10.1109/TEVC.2002.1011541
An Investigation of the Negative Selection Algorithm for Fault Detection in Refrigeration Systems, Lecture Notes in Computer Science: Artificial Immune Systems. Berlin, pp.34-45, 2003. ,
DOI : 10.1007/978-3-540-45192-1_4
A biologically inspired password authentication system, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, 2009. ,
DOI : 10.1145/1558607.1558654
URL : http://ais.cs.memphis.edu/files/papers/CSIIRW_Anti-Pion-abstract.pdf
Tool breakage detection in milling operations using a negativeselection algorithm, 1995. ,
Understanding the Immune System. United States Of America, p.40, 1991. ,
Artificial immune systems: Part II?A survey of applications, 2000. ,
DOI : 10.1007/978-3-540-73922-7
Understanding the Immune System -How It Works United States: National Institute of Allergy and Infectious Diseases Science Education, p.60, 2007. ,
Simulation: The Practice of Model Development and Use 1st Edition, p.339, 2004. ,
DOI : 10.1007/978-1-137-32803-8