Biological Inspiration for Artificial Immune Systems
Artificial immune systems (AISs) to date have generally been inspired by naive biological metaphors. This has limited the effectiveness of these systems. In this position paper two ways in which AISs could be made more biologically realistic are discussed. We propose that AISs should draw their insp...
| Main Authors: | Twycross, Jamie, Aickelin, Uwe |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Online Access: | https://eprints.nottingham.ac.uk/575/ |
Similar Items
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Information fusion in the immune system
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Experimenting with Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Libtissue - Implementing Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
'Towards a Conceptual Framework for Innate Immunity'
by: Twycross, Jamie, et al.
Published: (2005)
by: Twycross, Jamie, et al.
Published: (2005)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Integrating Innate and Adaptive Immunity for Intrusion Detection
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Special issue on artificial immune systems: editorial
by: Aickelin, Uwe
Published: (2008)
by: Aickelin, Uwe
Published: (2008)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
An Artificial Immune System Based Recommender
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
'Movie Recommendation Systems Using An Artificial Immune System'
by: Chen, Qi, et al.
Published: (2004)
by: Chen, Qi, et al.
Published: (2004)
'Movie Recommendation Systems Using An Artificial Immune System'
by: Chen, Qi, et al.
Published: (2004)
by: Chen, Qi, et al.
Published: (2004)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
An alert fusion model inspired by artificial immune system.
by: Mahboubian, Mohammad, et al.
Published: (2012)
by: Mahboubian, Mohammad, et al.
Published: (2012)
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
'On Affinity Measures for Artificial Immune System Movie Recommenders'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
'On Affinity Measures for Artificial Immune System Movie Recommenders'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'An Artificial Immune System as a Recommender System for Web Sites'
by: Morrison, Tom, et al.
Published: (2002)
by: Morrison, Tom, et al.
Published: (2002)
'An Artificial Immune System as a Recommender System for Web Sites'
by: Morrison, Tom, et al.
Published: (2002)
by: Morrison, Tom, et al.
Published: (2002)
Artificial immune systems (AIS) - a new paradigm for heuristic decision making
by: Aickelin, Uwe
Published: (2004)
by: Aickelin, Uwe
Published: (2004)
'Artificial Immune Systems: A new Decision Making Paradigm for Operational Research'
by: Aickelin, Uwe
Published: (2004)
by: Aickelin, Uwe
Published: (2004)
On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
Similar Items
-
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007) -
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005) -
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005) -
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010) -
Information fusion in the immune system
by: Twycross, Jamie, et al.
Published: (2010)