Detecting Motifs in System Call Sequences
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which repeat within time series data. The power of the...
| Main Authors: | Wilson, William, Feyereisl, J, Aickelin, Uwe |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Online Access: | https://eprints.nottingham.ac.uk/573/ |
Similar Items
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
The Motif Tracking Algorithm
by: Wilson, William, et al.
by: Wilson, William, et al.
A method for evaluating options for motif detection in
electricity meter data
by: Dent, Ian, et al.
Published: (2018)
by: Dent, Ian, et al.
Published: (2018)
Artificial Immune Tissue using Self-Organizing Networks
by: Feyereisl, J, et al.
Published: (2006)
by: Feyereisl, J, et al.
Published: (2006)
Artificial Immune Tissue using Self-Organizing Networks
by: Feyereisl, J, et al.
Published: (2006)
by: Feyereisl, J, et al.
Published: (2006)
Identification of sequence motifs for the protein components of type IX secretion system
by: Reeki Emrizal,, et al.
Published: (2018)
by: Reeki Emrizal,, et al.
Published: (2018)
STORM - a novel information fusion and cluster interpretation technique
by: Feyereisl, Jan, et al.
Published: (2010)
by: Feyereisl, Jan, et al.
Published: (2010)
Privileged information for data clustering
by: Feyereisl, Jan, et al.
Published: (2012)
by: Feyereisl, Jan, et al.
Published: (2012)
ToLeRating UR-STD
by: Feyereisl, Jan, et al.
Published: (2008)
by: Feyereisl, Jan, et al.
Published: (2008)
Self-organizing maps in computer security
by: Feyereisl, Jan, et al.
Published: (2009)
by: Feyereisl, Jan, et al.
Published: (2009)
Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data
by: Liu, Yihui, et al.
Published: (2013)
by: Liu, Yihui, et al.
Published: (2013)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Investigating the effectiveness of variance reduction techniques in manufacturing, call center and cross-docking discrete event simulation models
by: Adewunmi, Adrian, et al.
Published: (2012)
by: Adewunmi, Adrian, et al.
Published: (2012)
SOMIX: Motifs Discovery in Gene Regulatory Sequences Using Self-Organizing Maps
by: Lee, Nung Kion, et al.
Published: (2010)
by: Lee, Nung Kion, et al.
Published: (2010)
Memory implementations : current alternatives
by: Wilson, William, et al.
Published: (2005)
by: Wilson, William, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Strategic Alert Throttling for Intrusion Detection Systems
by: Tedesco, Gianni, et al.
Published: (2005)
by: Tedesco, Gianni, et al.
Published: (2005)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Filtering of Background DNA Sequences Improves DNA Motif Prediction Using Clustering Techniques
by: Lee, Nung Kion, et al.
Published: (2013)
by: Lee, Nung Kion, et al.
Published: (2013)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Optimization of MISCORE-based Motif Identification Systems
by: Lee, Nung Kion, et al.
Published: (2009)
by: Lee, Nung Kion, et al.
Published: (2009)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
MISCORE: Mismatch-Based Matrix Similarity Scores for DNA Motif Detection
by: Wang, Dianhui, et al.
Published: (2009)
by: Wang, Dianhui, et al.
Published: (2009)
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
Investigating the detection of adverse drug events in a UK general practice electronic health-care database
by: Reps, Jenna, et al.
Published: (2011)
by: Reps, Jenna, et al.
Published: (2011)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for SYN Scan Detection
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Similar Items
-
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007) -
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011) -
The Motif Tracking Algorithm
by: Wilson, William, et al. -
A method for evaluating options for motif detection in
electricity meter data
by: Dent, Ian, et al.
Published: (2018) -
Artificial Immune Tissue using Self-Organizing Networks
by: Feyereisl, J, et al.
Published: (2006)