-
1
-
-
36749034455
-
-
Aickelin U, Cayzer S. The danger theory and its application to artificial immune systems. In: Proceedings of the 1st international conference on artificial immune systems (ICARIS 2002), Canterbury, UK; 2002. p. 141-48.
-
-
-
-
3
-
-
26944469543
-
-
Greensmith J, Aickelin U, Cayzer S. Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: ICARIS-05. LNCS, vol. 3627; 2005. p. 153-67.
-
-
-
-
4
-
-
33751020563
-
-
Greensmith J, Aickelin U, Twycross J. Articulation and clarification of the dendritic cell algorithm. In: ICARIS-06, Oeiras, Portugal. LNCS, vol. 4163; 2006. p. 404-17.
-
-
-
-
5
-
-
34547278626
-
-
Greensmith J, Twycross J, Aickelin U. Dendritic cells for anomaly detection. In: CEC-06, Vancouver, Canada; 2006. p. 664-71.
-
-
-
-
6
-
-
34548084364
-
-
Greensmith J, Aickelin U. Dendritic cells for SYN scan detection. In: Proceedings of the genetic and evolutionary computation conference (GECCO 2007); 2007. p. 49-56.
-
-
-
-
8
-
-
36749022987
-
-
Greensmith J, Aickelin U, Tedesco G. Information fusion and anomaly detection with the dendritic cell algorithm. Information Fusion, in press.
-
-
-
-
10
-
-
36749048891
-
-
Hofmeyr S, Forrest S. Immunity by design. In: Proceedings of GECCO; 1999. p. 1289-96.
-
-
-
-
11
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr S., and Forrest S. Architecture for an artificial immune system. Evolutionary Computation 8 4 (2000) 443-473
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
12
-
-
36749044484
-
-
Kim J, Bentley P. Evaluating negative selection in an artificial immune system for network intrusion detection. In: Proceedings of GECCO; July 2001. p. 1330-7.
-
-
-
-
13
-
-
33751021110
-
-
Kim J, Bentley P, Wallenta C, Ahmed M, Hailes S. Danger is ubiquitous: detecting malicious activities in sensor networks using the dendritic cell algorithm. In: ICARIS-06. LNCS, vol. 4163; 2006.
-
-
-
-
14
-
-
35449005874
-
Immune system approaches to intrusion detection - a review
-
10.1007/s11047-006-9026-4
-
Kim J., Bentley P., Aickelin U., Greensmith J., Tedesco G., and Twycross J. Immune system approaches to intrusion detection - a review. Natural Computing 6 4 (2007) 413-466 10.1007/s11047-006-9026-4
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
15
-
-
0036715411
-
Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?
-
Lutz M.B., and Schuler G. Immature, semi-mature and fully mature dendritic cells: which signals induce tolerance or immunity?. Trends in Immunology 23 9 (2002) 445-449
-
(2002)
Trends in Immunology
, vol.23
, Issue.9
, pp. 445-449
-
-
Lutz, M.B.1
Schuler, G.2
-
16
-
-
0028201732
-
Tolerance, danger, and the extended family
-
Matzinger P. Tolerance, danger, and the extended family. Annual Review of Immunology 12 (1994) 991-1045
-
(1994)
Annual Review of Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
17
-
-
0037066502
-
Decoding the patterns of self and nonself by the innate immune system
-
Medzhitov R., and Janeway C.A. Decoding the patterns of self and nonself by the innate immune system. Science 296 (2002) 298-300
-
(2002)
Science
, vol.296
, pp. 298-300
-
-
Medzhitov, R.1
Janeway, C.A.2
-
18
-
-
33745201000
-
Anomalous system call detection
-
Mutz D., Valeur F., Vigna G., and Kruegel C. Anomalous system call detection. ACM Transactions on Information and System Security 9 1 (2006) 61-93
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
19
-
-
36749017141
-
-
Oates R, Greensmith J, Aickelin U, Garibaldi J, Kendall G. The application of a dendritic cell algorithm to a robotic classifier. In: ICARIS 2007; 2007.
-
-
-
-
21
-
-
36749031908
-
-
Stibor T. On the appropriateness of negative selection for anomaly detection and network intrusion detection. PhD thesis. Germany: Darmstadt University of Technology; 2006.
-
-
-
-
22
-
-
36749027331
-
-
Twycross J. Integrated innate and adaptive artificial immune systems applied to process anomaly detection. PhD thesis. U.K.: School of Computer Science, University of Nottingham; 2007.
-
-
-
-
23
-
-
26944450016
-
-
Twycross J, Aickelin U. Towards a conceptual framework for innate immunity. In: ICARIS-05, Banff, Canada. LNCS, vol. 3627; 2005. p. 112-25.
-
-
-
-
24
-
-
34547268613
-
-
Twycross J, Aickelin U. libtissue - implementing innate immunity. In: CEC-06, Vancouver, Canada; July 2006. p. 499-506.
-
-
-
-
25
-
-
36749043383
-
-
Williams C, Harry R, McLeod J. Mechanisms of Apoptosis induced DC suppression. Immunology, in press. doi:10.1111/j.1365-2567.2007.02743.x.
-
-
-
|