Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses, both reactive and for generating tolerance. We have derived...
| Main Authors: | Greensmith, Julie, Aickelin, Uwe, Cayzer, Steve |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2005
|
| Online Access: | https://eprints.nottingham.ac.uk/582/ |
Similar Items
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Dendritic Cells for SYN Scan Detection
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Artificial dendritic cells: multi-faceted perspectives
by: Greensmith, Julie, et al.
Published: (2009)
by: Greensmith, Julie, et al.
Published: (2009)
Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
by: Gu, Feng, et al.
Published: (2008)
by: Gu, Feng, et al.
Published: (2008)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Quiet in class: classification, noise and the dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2011)
by: Gu, Feng, et al.
Published: (2011)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
The functional dendritic cell algorithm: a formal specification with Haskell
by: Greensmith, Julie, et al.
Published: (2017)
by: Greensmith, Julie, et al.
Published: (2017)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
An Artificial Immune System Based Recommender
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
A Recommender System based on the Immune Network
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
An immune inspired Network Intrusion Detection System utilising correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
The Danger Theory and its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
The Danger Theory and Its Application to Artificial Immune Systems
by: Aickelin, Uwe, et al.
Published: (2002)
by: Aickelin, Uwe, et al.
Published: (2002)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
A Recommender System based on Idiotypic Artificial Immune Networks
by: Cayzer, Steve, et al.
Published: (2005)
by: Cayzer, Steve, et al.
Published: (2005)
On The Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
'On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems'
by: Cayzer, Steve, et al.
Published: (2002)
by: Cayzer, Steve, et al.
Published: (2002)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Similar Items
-
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005) -
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005) -
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008) -
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006) -
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)