-
1. Gordon L.A., Loeb M.P., Lucyshyn W. , Richardson R.: 2005 CSI/FBI Computer Crime And Security Survey. http://www.gocsi.com.
-
2. Cetnarowicz K., Cięciwa R., Rojek G.: Algorithm of Behavior Evaluation in Multi-agent System. Lecture Notes in Computer Science, Vol. 3516, Springer-Verlag, p.711-718, 2005.
-
3. Cetnarowicz K., Cięciwa R., Nawarecki E., Rojek G.: Unvaforable Behavior Detection in Real World Systems Using the Multiagent System. Advances in Soft Computing, Intelligent Information Processing and Web Mining, Springer-Verlag, p. 416-420, 2005.
-
4. Cetnarowicz K.: M-agent architecture based method of development of multiagent systems. Proc. of the 8th EPS-APS International Confrrence on Physics Computing, ACC Cyfronet, Kraków, 1996.
-
5. Forrest S., Perelson A. S., Allen L., Cherukuru R.: A change-detection algorithm inspired by the immune system. Los Alamitos (Ed.) IEE Transactions on Software Engineering, IEEE Computer Society Press, 1995.
-
6. Wierzchoń S. T.: Sztuczne systemy immunologiczne: teoria i zastosowania. Akademicka Oficyna Wydawnicza Exit, Warszawa, 2001.