1. Immunity by design: an artificial immune system;Hofmeyr;Proceedings of the Genetic and Evolutionary Computation Conference,1999
2. M. Asaka, S. Okazawa, A. Taguchi, S. Goto, A method of tracing intruders by use of mobile agents, in: INET’99, 1999.
3. J. Beale, J.C. Foster, Snort 2.0 Intrusion Detection. Syngeress, 2003.
4. D. Dasgupta, H. Brian, Mobile security agents for network traffic analysis. 2 (2001) 32–340.
5. An Artificial Immune Based Intrusion Detection Detection Model for Computer and Telecommunication Systems;Boukerche;Parallel Computing,2004