[1]
P. Nesteruk, I. Kotenko, and A. Shorov, “Analysis of bio-inspired approaches for protection of computer systems and networks”, SP, vol. 3, no. 18, pp. 19-73, Sep. 2011.