U. Aickelin, P. Bentley, S. Cayzer, K. J. Mcleod, and J. , Danger Theory: The Link between AIS and IDS, 2nd International Conference on Artificial Immune Systems, 2003.

U. Aickelin and J. Greensmith, Sensing Danger: Innate Immunology for Intrusion Detection, pp.218-227, 2007.

D. Dasgupta and F. Gonzalez, Artificial Immune Systems in Intrusion Detection, chapter 7 of " Enhancing computer security with smart technology, 2005.

D. Dasgupta and L. F. Nino, Immunological Computation, theory and application, 2009.

H. Debar, An Introduction to Intrusion-Detection Systems, Proceedings of Connect, 2000.

J. Fu and H. Yang, Introducing Adjuvants to Dendritic Cell Algorithm for Stealthy Malware Detection, 2012 Fifth International Symposium on Computational Intelligence and Design, pp.18-22
DOI : 10.1109/ISCID.2012.156

L. Geng and H. Jia, Smart Intrusion Detection Method Using Negative Selection Algorithm Based on Maximum Entropy Model, 2009 International Conference on Artificial Intelligence and Computational Intelligence, pp.339-344, 2009.
DOI : 10.1109/AICI.2009.92

V. Golovko, S. Bezobrazov, P. Kachurka, and L. Vaitsekhovich, Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection, Advances in Machine Learning II, SCI 263, pp.485-513, 2010.
DOI : 10.1007/978-3-642-05179-1_23

J. Greensmith, U. Aickelin, and S. Cayzer, Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection, Proceedings of the 4th international conference on Artificial Immune Systems, pp.153-167, 2005.
DOI : 10.2139/ssrn.2832073

J. Greensmith, J. Twycross, and U. Aickelin, Dendritic Cells for Anomaly Detection, Evolutionary Computation, pp.664-671, 2006.

J. Greensmith, The Dendritic Cell Algorithm, 2007.

J. Greensmith, J. Feyereisl, and U. Aickelin, The DCA: SOMe comparison, Evolutionary Intelligence, vol.25, issue.7, pp.85-112, 2008.
DOI : 10.1007/s12065-008-0008-6

H. G. Kayacik, A. N. Zincir-heywood, and M. I. Heywood, Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets, Proceedings of the Third Annual Conference on Privacy, Security and Trust, 2005.

J. Kim, P. J. Bentley, U. Aickelin, J. Grennsmith, G. Tedesco et al., Immune system approaches to intrusion detection ??? a review, Natural Computing, vol.1, issue.3, pp.413-466, 2007.
DOI : 10.1007/s11047-006-9026-4

K. Kumari, A. Jain, and A. Jain, An Efficient Approach to Categorize Data Using Improved Dendritic Cell Algorithm with Dempster Belief Theory, Proceedings of All India Seminar on Biomedical Engineering, pp.165-172, 2013.
DOI : 10.1007/978-81-322-0970-6_20

K. Luther, R. Bye, T. Alpcan, A. Muller, and S. Albayrak, A Cooperative AIS Framework for Intrusion Detection, 2007 IEEE International Conference on Communications, pp.1409-1416, 2007.
DOI : 10.1109/ICC.2007.237

M. F. Marhusin, D. Cornforth, and H. Larkin, Malicious Code Detection Architecture Inspired by Human Immune System, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp.312-317, 2008.
DOI : 10.1109/SNPD.2008.160

P. Mostardinha, B. F. Faria, A. Zúquete, and F. Vistulo-de-abreu, A Negative Selection Approach to Intrusion Detection, Artificial Immune Systems, Lecture Notes in Computer Science 7597, pp.178-190, 2012.
DOI : 10.1007/978-3-642-33757-4_14

J. Pieprzyk, T. Hardjono, and J. Seberry, Intrusion Detection, Fundamentals of Computer Security, 2003.
DOI : 10.1007/978-3-662-07324-7_14

H. M. Salmon, C. M. De-farias, P. Loureiro, L. Pirmez, S. Rossetto et al., Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques, International Journal of Wireless Information Networks, vol.32, issue.1, pp.39-66, 2013.
DOI : 10.1007/s10776-012-0179-z

F. Seredynski and P. Bouvry, Anomaly detection in TCP/IP networks using immune systems paradigm, Computer Communications, vol.30, issue.4, pp.740-749, 2006.
DOI : 10.1016/j.comcom.2006.08.016

K. A. Sheshtawi, H. M. Abdul-kader, and N. A. Ismail, Artificial Immune Clonal Selection Classification Algorithms for Classifying Malware and Benign Processes Using API Call Sequences, International Journal of Computer Science and Network Security, vol.10, issue.4, 2010.

M. Simon and . Garrett, How do we evaluate artificial immune systems, Evolutionary Computation, vol.13, issue.2, pp.145-178, 2005.

T. Stibor, On the Appropriateness of Negative Selection for Anomaly Detection and Network Intrusion Detection, 2006.

Y. Sun and X. Zhou, Artificial Immune for Harmful Information Filtering
DOI : 10.1007/978-3-642-21762-3_16

X. Wang, Research of Immune Intrusion Detection Algorithm Based on Semi-supervised Clustering, Artificial Intelligence and Computational Intelligence Lecture Notes in Computer Science 7003, pp.69-74, 2011.
DOI : 10.1007/978-3-642-23887-1_9

J. Zeng, T. Li, G. Li, and H. Li, A New Intrusion Detection Method Based on Antibody Concentration, Emerging Intelligent Computing Technology and Applications, With Aspects of Artificial Intelligence Lecture Notes in Computer Science, vol.5755, pp.500-509, 2009.