Burnet F M. Clonal selection and after[A]. In: Bell G I, Perelson A S, Pimbley G H eds. Theoretical Immunology [ C ]. New York:Marcel Dekker Inc, 1978:63 - 85.
[4]
De Castro L N, Von Zuben F J. Clonal selection algorithm with engineering applications [ A ]. In: Proceedings of Genetic and Evolutionary Computation Conference 00 [ C ], Las Vegas, Nevada,USA ,2000:36 - 37.
[5]
王正志 薄涛.进化计算[M].长沙:国防科技大学出版社,2000.26-41.
[6]
孙家柄 舒宁 关泽群.遥感原理方法和应用[M].北京:测绘出版社,1997..
[7]
Jerne N K. The immune system [ J ]. Scientific American, 1973,229( 1 ) :51 -60.
[8]
Kim J, Bentley P. The artificial immune model for network intrusion detection [ A ]. In: Proceedings of 7th European Congress on Intelligent Techniques and Soft Computing[ C ] , Aachen, Germany,1999 : 13 - 19.
[9]
Kim J, Bentley P. Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator [ A ]. In: Proceedings of Congress on Evolutionary Computation [ C ], Seoul, Korea, 2001:27 - 30.