1 |
R. A. Wallace, G. P. Sanders, and R. J. Ferl, BIOLOGY: The Science of Life, 3rd edition, HarperCollins Publishers Inc., 1991
|
2 |
I. Roitt, J. Brostoff, D. Male, Immunology, 4th edition, Mosby, 1996
|
3 |
P. Baldi, S. Brunak, Bioinformatics: The Machine Learning Approach, MIT Press, Cambridge, Mass., 2001
|
4 |
M. Gelfand, 'Prediction of function in DNA sequence analysis,' J. Computational Biology, vol. 1, pp. 87-115, 1995
|
5 |
Comparative RNA Web Site, URL:http://www.rna. icmb.utexas.edu/
|
6 |
K. B. Hwang, D. Y. Cho, S. W. Park, S. D. Kim, and B. T. Zhang, 'Applying machine learning techniques to analysis of gene expression data: Cancer diagnosis,' in Methods of Microarray Data Analysis, Kluwer Academic Publishers, pp. 167-182, 2002
|
7 |
J. Kim, and P. J. Bentley, 'Towards an artificial immune system for network intrusion detection: An investigation of clonal selection with a negative selection operator,' Proc. Congr. Evolutionary Computation, pp. 1244-1252, 2001
|
8 |
F. Esponda, S. Forrest, anti P. Helman, 'Formal framework for positive and negative detection scheme,' IEEE Trans. Syst., Man, Cybern., Part B, vol. 34, no. 1, pp.357-373, Feb. 2004
DOI
ScienceOn
|
9 |
G. B. Fogel, K. Chellapilla, and D. B. Fogel, 'Identification of coding regions in DNA sequences using evolved neural networks,' in Evolutionary Computation in Bioinformatics, G. B. Fogel and D. W. Corne, Eds. San Francisco, CA: Morgan Kaufmann, pp. 196-218, 2003
|
10 |
K. B. Sim and D. W. Lee, 'Self-nonself recognition algorithm based on positive and negative selection,' IEICE Trans. Info. & Syst., vol. E87-D, no. 2, Feb. 2004
|
11 |
S. Forrest, A. S. Perelson, L. Allen, and R. Cherukuri 'Self-nonself discrimination in a computer,' Proc. IEEE Symposium on Research in Security and Privacy, pp. 202-212, 1994
|
12 |
D. Dasgupta, S. Forrest, 'An anomaly detection algorithm inspired by the immune system,' in Artificial Immune Systems and Their Applications, D. Dasgupta, Ed., Springer, pp. 262-276, 1999
|
13 |
P. D'haeseleer, S. Forrest, and P. Helman, 'An immunological approach to change detection: algorithms, analysis, and implications,' Proc. IEEE Symp. Computer Security Privacy, pp. 110-119, 1996
|