'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present the blueprint of a T-cell inspired algorithm for co...
| Main Authors: | Kim, Jungwon, Wilson, William, Aickelin, Uwe, McLeod, Julie |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Springer - Verlag
2005
|
| Online Access: | https://eprints.nottingham.ac.uk/277/ |
Similar Items
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Multi-robot cooperation inspired by immune systems
by: Razali, Sazalinsyah, et al.
Published: (2009)
by: Razali, Sazalinsyah, et al.
Published: (2009)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Experimenting with Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Immune Inspired Cooperative Mechanism with Refined Low-level Behaviors for Multi-Robot Shepherding
by: Razali, Sazalinsyah, et al.
Published: (2012)
by: Razali, Sazalinsyah, et al.
Published: (2012)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Information fusion in the immune system
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Libtissue - Implementing Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Special issue on artificial immune systems: editorial
by: Aickelin, Uwe
Published: (2008)
by: Aickelin, Uwe
Published: (2008)
Nematospiroides dubius in the mouse: evidence that adult worms depress the expression of homologous immunity
by: Behnke, Jerzy M., et al.
Published: (1983)
by: Behnke, Jerzy M., et al.
Published: (1983)
An Artificial Immune System Based Recommender
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
A Recommender System based on the Immune Network
by: Cayzer, S, et al.
Published: (2002)
by: Cayzer, S, et al.
Published: (2002)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
A Recommender System based on the Immune Network
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Similar Items
-
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005) -
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011) -
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007) -
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006) -
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)