[1]
M.R. Endsley: Design and evaluation for situation awareness enhancement. Human Factors Society 32nd Annual Meeting, Anaheim, CA (1988), p.97.
DOI: 10.1177/154193128803200221
Google Scholar
[2]
T. Bass: Intrusion Detection Systems and Multisensor Data Fusion: Creating Cyberspace Situational Awareness. Communications of the ACM Vol. 43(2000), p.99.
DOI: 10.1145/332051.332079
Google Scholar
[3]
CHEN Xiu-zhen, ZHENG Qing-hua, et al: Study on evaluation for security situation of networked systems. Journal of Xi'an Jiaotong University Vol. 38(2004), p.404.
Google Scholar
[4]
S.G. Batsell, N. S. Rao and M. Shankar: Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security. Information on http: /www. ioc. ornl. gov/projects/documents- /containment. pdf.
Google Scholar
[5]
J. Shifflet: A Technique Independent Fusion Model for Network Intrusion Detection. Information on http: /www. jcu. edu/math/swarm/papers/Jason2005. pdf.
Google Scholar
[6]
L.N. De Castro, J. Timmis: Artificial Immune Systems: A New Computational Intelligence Approach. Springer-Verlag(2002), p.53.
Google Scholar
[7]
Li Tao: Computer Immunology. Publishing House of Electronics Industry, Beijing (2004).
Google Scholar
[8]
Li Tao: An immunity based network security risk estimation. Science in China Ser F Information Sciences Vol. 48(2005), p.557.
Google Scholar
[9]
JIAO Li-cheng, DU Hai-feng: Development and Prospect of the Artificial Immune System. Acta Electronica Sinca Vol. 31(2003), p.1540.
Google Scholar
[10]
L. N. de Castro, F. J. Von Zuben: The clonal selection algorithm with engineering applications. In Workshop Proceedings of GECCO'00, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, USA(2000), p.36.
Google Scholar
[11]
Maoguo Gong, Licheng Jiao, et al: Immune secondary response and clonal selection inspired optimizers. Progress in Natural Science Vol. 19(2009), p.237.
DOI: 10.1016/j.pnsc.2008.05.026
Google Scholar
[12]
Zhaohui Gan, Tommy W.S. Chow and W.N. Chau: Clone selection programming and its application to symbolic regression. Expert Systems with Applications Vol. 36(2009) p.3996.
DOI: 10.1016/j.eswa.2008.02.030
Google Scholar
[13]
Zhou Zhi-hua, Cao Cun-gen: Neural network and its application. Tsinghua University Press, Beijing (2004).
Google Scholar
[14]
George G. Szpiro: Forecasting chaotic time series with genetic algorithms. The American Physical Society (1997), p.2557.
Google Scholar
[15]
Sun Ning: Artificial Immune Optimization Algorithm and Applications. Harbin Institute of Technology, Harbin (2006).
Google Scholar
[16]
Richard F. Gilberg, Behrouz A. Forouzan: Data Structures-A Pseudocode Approach with C++. Posts & Telecommunications Press, Beijing (2002).
Google Scholar