C. C. Aggarwal, A. Hinneburgand, and D. A. Keim, On the Surprising Behavior of Distance Metrics in High Dimensional Space, LNCS, vol.1973, pp.420-434, 2001.
DOI : 10.1007/3-540-44503-X_27

J. Balthrop, F. Esponda, S. Forrest, and M. Glickman, Coverage and generalization in an artificial immune system, Proc. of the Genetic and Evolutionary Computation Conference, pp.9-13, 2002.

M. Brzozowski and A. Chmielewski, Hardware Approach for Generating b-detectors by Immune-Based Algorithms, Computer Information Systems and Industrial Management, LNCS, vol.8838, pp.615-623, 2014.
DOI : 10.1007/978-3-662-45237-0_56

P. P. Chu, RTL Hardware Design Using Vhdl: Coding For Efficiency, Portability, and Scalability, 2006.
DOI : 10.1002/0471786411

A. Chmielewski and S. T. Wierzcho´nwierzcho´n, On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Biaa lostockiej, pp.39-50, 2007.

A. Chmielewski and S. T. Wierzcho´nwierzcho´n, Hybrid Negative Selection Approach for Anomaly Detection, Computer Information Systems and Industrial Management, pp.242-253, 2012.
DOI : 10.1007/978-3-642-33260-9_21

URL : https://hal.archives-ouvertes.fr/hal-01551730

S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, A sense of self for Unix processes, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.120-128, 1996.
DOI : 10.1109/SECPRI.1996.502675

S. Forrest, A. Perelson, L. Allen, and R. Cherukuri, Self-nonself discrimination in a computer, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp.202-212, 1994.
DOI : 10.1109/RISP.1994.296580

URL : http://www.santafe.edu/media/workingpapers/94-06-038.pdf

P. K. Harmer, P. D. Wiliams, G. H. Gunsch, and G. B. Lamont, An artificial immune system architecture for computer security applications, IEEE Transactions on Evolutionary Computation, vol.6, issue.3, pp.252-280, 2002.
DOI : 10.1109/TEVC.2002.1011540

URL : http://www.mnlab.cs.depaul.edu/~mtaibah/papers/control and containment/An artificial immune system architecture for computer security applications.pdf

Z. Ji and D. Dasgupta, Real-valued negative selection algorithm with variable-sized detectors. Genetic and Evolutionary Computation GECCO-2004, Part I, LNCS, vol.3102, pp.287-298, 2004.
DOI : 10.1007/978-3-540-24854-5_30

URL : http://www.zhouji.net/prof/438reformat.pdf

Z. Ji and D. Dasgupta, Revisiting Negative Selection Algorithms, Evolutionary Computation, vol.1, issue.3, pp.223-251, 2007.
DOI : 10.1109/TEVC.2002.1011540

URL : http://www.mitpressjournals.org/userimages/ContentEditor/1164817256746/lib_rec_form.pdf

T. Stibor, P. H. Mohr, J. Timmis, and C. Eckert, Is negative selection appropriate for anomaly detection? GECCO, pp.321-328, 2005.
DOI : 10.1145/1068009.1068061

W. Vanderbauwhede and K. Benkrid, High-Performance Computing Using FPGAs, 2013.
DOI : 10.1007/978-1-4614-1791-0