3Verissimo P, Neves N F, Correia M. Intrusion-tolerant architectures : concepts and design Architecting dependable systems[J]. Lecture Notes in Computer Science, Springer Verlag, 2003,2677 : 3-36.
4Mead N R, Ellison R J, Linger R C, et al. Survivable Network Analysis Method [C] // Intrusion Tolerant Systems Joint PI Meeting Presentation. Washington.. IEEE Computer Society Press, 2004.
5De castro L. N, yon Zubcn P J. An artificial immune network for data analysis[A]. Abbas H A, Sarker R A, Newton C S, et al. Data Ming.. A Heuristic Apprach[M]. Idea Growp Publishing,2001,231.
6Dengguo Feng, Ji Xiang. Experiences on Intrusion Tolerance Distributed System[C]//Proceedings of the Zgth Annual International Computer Software and Application Conference (COMPSAC'05) 2005 IEEE.
7Yingqian Zhang, Efrat Manisterski, Sarit Kraus, et al. Computing the fault tolerance of multi-agent deployment[J]. Artificial Intelligence, 2009 (173) : 437-465.
8Agustin Orfila, Javier Carbo, Arturo Ribagorda. Autonomous decision on intrusion detection with trained BDI agents[J]. Computer Communications, 2008 (31) : 1803- 1813.
9Lal G, Zhang N, van der Touw W, et al. Epigenetic regulation of Foxp3 expression in regulatory T cells by DNA methylation [J]. Nat Rev Immunol, 2009, 9(2):83.
10Hori S, Nomura T, Sakaguchi S, et al. Control of regulator, T cell development by the transcription tactor Foxp3[J]. Science, 2003, 2999 ( 5609 ): 1057.