[1] | G. Meade, Department of Defense Trusted Computer System Evaluation Criteria, National Computer Security Service Centre, 1985. csfc.nist.gov/publications/history/dod85.pdf accessed February 2013 |
[2] | S. Garfinkel, G. Spafford. Practical UNIX and Internet Security, 2nd Edition. O’Reilly and Associates, Inc. 1996 |
[3] | C. Janeway, P. Traves, Immunobilogy, The Immune System in Health and Disease, 2nd Edition, Garland Science, New York, 1996 |
[4] | C. Rui, T. Ying, A Virus Detection System Based on Artificial Immune System, International Conference on Computational Intelligence and Security, China. www.cii.pku.edu.cn/publication, 2009. |
[5] | N. Liu, D. Wang, X. Huang, S. Liu, K. Zhao, Network Security Situation Awareness\Technology based on Artificial Immunity System. International Forum on Information Technology and Applications, 2009. |
[6] | C.A. Janeway, P. Travers, M. Walport, M.J. Shilomchik, Immunology: The Immune System in Heath and desease, 5th Edition, New York: Garland, 2001. |
[7] | F. Stephanie, S.P. Alan, A. Lawrence, C. Rajesh, Self-Nonself Discrimination in a Computer. Proc of IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Press, 1994. pp. 202 - 212. |
[8] | S.A. Hofmey, An Immunological Model of Distributed Detection and its Application to Computer Security, PhD Dissertation, University of New Mexico, 1999. |
[9] | S. Forrest, T.A. Longstaff, "A Sense of Self for Unix processes", Proceedings of IEEE Symposium on Computer Security and Privacy, Los Alamos, CA, 1996, pp.120-128. |
[10] | S. Bellovin, Defending against sequence number attacks internet engineering task force, May RFC 1948. number attacks internet engineering task force, May, RFC 1948, 1996 |
[11] | L. Wenke, A data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. PhD dissertation, Columbia University, USAhttp://www.cc.gatech.edu/~wenke, 1999. |
[12] | S. Northcutt, J. Novak, Network Intrusion Detection: An Analyst’s Handbook, Second Edition, New Riders Publishers, USA, 2001. |
[13] | S. Kumar, Classification and Detection of Computer Intrusions. PhD Dissertation, Department of Computer Science, Purdue University, 1995. |
[14] | H. Debar, What is behavior based intrusion detection? IBM Zurich Research Laboratory, www.sans.org/privacy.php, 2003 |
[15] | S. Axelsson, Intrusion Detection Systems: A survey and Taxonomy, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. Technical Report TR-99-15,2000. |
[16] | M. V. Mahoney, A machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic, College of Engineering at Florida Institute of Technology, USA, PhD Dissertation, 2003. |
[17] | KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup |
[18] | A.O. Adetunmbi, S.O. Adeola, O.A. Daramola Relevance Features Selection for Intrusion Detection, Intelligent, Automation and System Engineering, Lecture Notes in Electrical Engineering, (Boston Springer), vol. 103, 2011, pp. 407 – 418. |
[19] | A.O. Adetunmbi, S.O. Falaki, O.S. Adewale, B.K. Alese, Intrusion Detection based on rough Set and k-Nearest Neighbour, International Journal of Computing and ICT Research, vol. 2 No. 1, 2008, pp. 60-66. |
[20] | H. Jiawei, K. Micheline, Data Mining: Concepts and Techniques, Second Edition, Elsevier Inc., 2006. |