1 |
R.A. Goldsby, T.J. Kindt, and B.A Osborne, Kuby Immunology, 4th ed. W.H Freeman and Company: New York, 2000
|
2 |
Roitt I, Brostoff J, Male DK. Immunology. 5th ed. St Louis, MOL Mosby International Limited, 1998
|
3 |
D.W. Bradley and AM. Tyrrell, 'Immunotronics -Novel Finite-State-Machine Architectures With Built-In Self-Test Using Self-Nonself Differentiation,' IEEE Trans. On Evolutionary Computation, Vol.6, No.3, Jun. 2002, pp. 227-238
DOI
ScienceOn
|
4 |
D.E Goldberg, Genetic Algorithms in Search, Optimization and Matching Learning, Addison-Wesley:MA 1989
|
5 |
Y. Chen and T. Chen, 'Implementing fault-tolerance via modular redundancy with comparison,' IEEE Transactions on Reliability, Vol. 39, Issue: 2 , Jun.1900, pp. 217 -225
DOI
ScienceOn
|
6 |
S. Dutt .and N.R. Mahapatra, 'Node-covering, error -correcting co -des and multiprocessors with very high average fault tolerance,' IEEE Trans. Comput., Vol. 46, Sep.1997, pp.997-1914
DOI
ScienceOn
|
7 |
P. K. Lala, Digital Circuit Testing and Testablilty, New York: Academic, 1997
|
8 |
P. K. Harmer, P. D.Williams, G. H. Grunsch, and G. B.Lamont, 'An Artificial Immune System Architecture For Computer Security Applications,' IEEE Transactions on Evolutionary Computation, Vol.6, No.3, Jun. 2002, pp. 252-280
DOI
ScienceOn
|
9 |
P.D'haeseller, S. Forrest, P. Helman, 'An Immunological Approach to Change Detection: Alogorithms, Analysis and Implications,' Proc. Of IEEE Symp. On Security and Privacy, 1996
DOI
|
10 |
S.A. Hofmeyr and S. Forest, 'Architecture for an artificial immune system,' Evol.Comput.,vol.8, no. 4, pp.443-473
DOI
ScienceOn
|
11 |
D.Dasgupta, 'An artificial immune system as a multi-agent decision support system,' Proc. IEEE Int. Conf. Systems, Man and Cybernetics, Oct. 1998, pp.3816-3820
DOI
|
12 |
S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaff, 'A Sense of Self for Unix Processing,' Proc.IEEE Symp, Computer Security and Privacy, May, 1900, pp.120-128
DOI
|
13 |
S.Forrest, L.Allen, A.S. Perelson, and R.Cheru -kuri, 'Self-Nonself Discrimination In A Computer,' Proceedings of IEEE Symposium on Research in Security and Privacy, 1994, pp.202-212
DOI
|