'Danger Theory: The Link between AIS and IDS?'
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have prot...
| Main Authors: | Aickelin, Uwe, Bentley, P, Cayzer, S, Kim, J, McLeod, J |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Springer-Verlag
2003
|
| Online Access: | https://eprints.nottingham.ac.uk/264/ |
Similar Items
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003)
by: Aickelin, Uwe, et al.
Published: (2003)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
A machine learning based AIS IDS.
by: Mahboubian, Mohammad, et al.
Published: (2013)
by: Mahboubian, Mohammad, et al.
Published: (2013)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
MicroRNAs and intellectual disability (ID) in Down syndrome, X-linked ID and Fragile X syndrome
by: Siew, Wei Hong, et al.
Published: (2013)
by: Siew, Wei Hong, et al.
Published: (2013)
A Recommender System based on the Immune Network
by: Cayzer, S, et al.
Published: (2002)
by: Cayzer, S, et al.
Published: (2002)
On the role of the AIS practitioner
by: Hart, Emma, et al.
Published: (2013)
by: Hart, Emma, et al.
Published: (2013)
Artificial immune systems (AIS) - a new paradigm for heuristic decision making
by: Aickelin, Uwe
Published: (2004)
by: Aickelin, Uwe
Published: (2004)
When a Bad Bias Can Be Good: Anxiety-Linked Attentional Bias to Threat in Contexts Where Dangers Can Be Avoided
by: Notebaert, L., et al.
Published: (2017)
by: Notebaert, L., et al.
Published: (2017)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
An Artificial Immune System Based Recommender
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
A Recommender System based on the Immune Network
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
Intrusion Prevention and Self-Healing Algorithms Inspired by Danger Theory
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Dangerous Amphetamines
by: Abd Razak, Dzulkifli
Published: (1996)
by: Abd Razak, Dzulkifli
Published: (1996)
Danger theory metaphor in artificial immune system for system call data
by: Anjum Iqbal, Anjum Iqbal
Published: (2006)
by: Anjum Iqbal, Anjum Iqbal
Published: (2006)
The white-crowned black wheatear (Oenanthe leucopyga) in St. Katherine, Sinai: age related differences in territorial aggression and breeding success
by: McLeod, Luke
Published: (2014)
by: McLeod, Luke
Published: (2014)
Mimicking the behaviour of idiotypic AIS robot controllers using probabilistic systems
by: Whitbrook, Amanda, et al.
Published: (2009)
by: Whitbrook, Amanda, et al.
Published: (2009)
The use of probabilistic systems to mimic the behaviour of idiotypic AIS robot controllers
by: Whitbrook, Amanda, et al.
Published: (2009)
by: Whitbrook, Amanda, et al.
Published: (2009)
Dangers of fake dentists
by: Che Musa, Muhd Firdaus, et al.
Published: (2019)
by: Che Musa, Muhd Firdaus, et al.
Published: (2019)
Disease danger in floodwaters
by: Tan, Ching Siang, et al.
Published: (2021)
by: Tan, Ching Siang, et al.
Published: (2021)
Irresponsible and dangerous trend
by: Shah, Aliza
Published: (2025)
by: Shah, Aliza
Published: (2025)
Dangers of excessive usage
by: Gerard, Gimino
Published: (2022)
by: Gerard, Gimino
Published: (2022)
A dangerous loop
by: Ahmad, Saqib, et al.
Published: (2016)
by: Ahmad, Saqib, et al.
Published: (2016)
When is a little knowledge dangerous?: circumstances of recent heroin overdose and links to knowledge of overdose risk factors
by: Dietze, P., et al.
Published: (2006)
by: Dietze, P., et al.
Published: (2006)
Similar Items
-
'Danger Theory: The Link between AIS and IDS?'
by: Aickelin, Uwe, et al.
Published: (2003) -
Danger theory: the link between AIS and IDS?
by: Aickelin, Uwe, et al.
Published: (2003) -
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002) -
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002) -
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)