Motif detection inspired by immune memory
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify variable length unknown motifs which repeat within time series data. T...
| Main Authors: | Wilson, William, Birkin, Phil, Aickelin, Uwe |
|---|---|
| Format: | Article |
| Published: |
Springer Verlag
2007
|
| Online Access: | https://eprints.nottingham.ac.uk/576/ |
Similar Items
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006)
by: Wilson, William, et al.
Published: (2006)
The Motif Tracking Algorithm
by: Wilson, William, et al.
by: Wilson, William, et al.
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Detecting Motifs in System Call Sequences
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Memory implementations : current alternatives
by: Wilson, William, et al.
Published: (2005)
by: Wilson, William, et al.
Published: (2005)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
Artificial Immune System and Intrusion Detection Tutorial
by: Aickelin, Uwe
Published: (2003)
by: Aickelin, Uwe
Published: (2003)
A method for evaluating options for motif detection in
electricity meter data
by: Dent, Ian, et al.
Published: (2018)
by: Dent, Ian, et al.
Published: (2018)
Modelling Immunological Memory
by: Garrett, Simon, et al.
Published: (2006)
by: Garrett, Simon, et al.
Published: (2006)
An Immune Network Intrusion Detection System Utilising Correlation Context
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Integrating Innate and Adaptive Immunity for Intrusion Detection
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Special issue on artificial immune systems: editorial
by: Aickelin, Uwe
Published: (2008)
by: Aickelin, Uwe
Published: (2008)
Experimenting with Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2005)
by: Aickelin, Uwe, et al.
Published: (2005)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Information fusion in the immune system
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Libtissue - Implementing Innate Immunity
by: Twycross, Jamie, et al.
Published: (2006)
by: Twycross, Jamie, et al.
Published: (2006)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
Multi-robot cooperation inspired by immune systems
by: Razali, Sazalinsyah, et al.
Published: (2009)
by: Razali, Sazalinsyah, et al.
Published: (2009)
A Recommender System based on the Immune Network
by: Cayzer, S, et al.
Published: (2002)
by: Cayzer, S, et al.
Published: (2002)
Cloud co-residency denial of service threat detection
inspired by artificial immune system
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
An Artificial Immune System Based Recommender
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Artificial immune systems
by: Aickelin, Uwe, et al.
Published: (2014)
by: Aickelin, Uwe, et al.
Published: (2014)
Similar Items
-
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011) -
Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006) -
Oil Price Trackers Inspired by Immune Memory
by: Wilson, William, et al.
Published: (2006) -
The Motif Tracking Algorithm
by: Wilson, William, et al. -
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)